Cyber News

  • Mon, 29 May 2017 Phishing

    'Tainted Leaks': Russia-Linked Phishing and Disinformation

    All
    'Tainted Leaks': Russia-Linked Phishing and Disinformation

    Russia-linked actors are pilfering data through phishing campaigns and then releasing falsified documents...

    Read More
  • Mon, 29 May 2017 Personal Information

    Hackers Stole Restaurants' Payment Data

    All
    Hackers Stole Restaurants' Payment Data

    A malware pilfered Chipotle customers' credit card data in a data breach...

    Read More
  • Mon, 29 May 2017 Ransomware

    Chinese WannaCry Ransom Note Could Be Original Note

    All
    Chinese WannaCry Ransom Note Could Be Original Note

    The Simplified and Traditional Chinese versions of WannaCry's ransom note contained more details and colloquialisms...

    Read More
  • Mon, 29 May 2017 Cyber Security Solutions

    EsteemAudit Gets Windows XP, Server 2003 Patch

    All
    EsteemAudit Gets Windows XP, Server 2003 Patch

    US cyber security firm enSilo has released a patch for Windows XP and Windows Server 2003 to protect users from attacks leveraging on EsteemAudit...

    Read More
  • Mon, 29 May 2017 Malware

    Judy Malware Spreads Via More Than 40 Apps

    All
    Judy Malware Spreads Via More Than 40 Apps

    The Judy malware campaign has been spreading via more than 40 applications on Google Play Store...

    Read More
  • Fri, 26 May 2017 Malware

    EternalRocks Shuts Down

    All
    EternalRocks Shuts Down

    The developer of the EternalRocks Server Messaging Block (SMB) worm has shut down his operation...

    Read More
  • Fri, 26 May 2017 Trojan

    Mutating Qakbot Malware Targets Enterprise Networks

    All
    Mutating Qakbot Malware Targets Enterprise Networks

    The information stealing, self-propagating Trojan, Qakbot, has been targeting businesses...

    Read More
  • Fri, 26 May 2017 Vulnerability

    Two Android User Features Leave Millions At Risk

    All
    Two Android User Features Leave Millions At Risk

    Two user features in the Android system, "system alert window" and "bind accessibility service" can be used...

    Read More
  • Fri, 26 May 2017 Vulnerability

    Twitter Bug Allows Attacker to Tweet From Any Account

    All
    Twitter Bug Allows Attacker to Tweet From Any Account

    A bug in Twitter's ad platform, ads.twitter.com, allows a hacker to tweet as any user...

    Read More
  • Fri, 26 May 2017 Cyber Security Guide

    Common Vulnerabilities and Exposures (CVE)

    All
    Common Vulnerabilities and Exposures (CVE)

    CVE is a catalogue of known security threats for publicly released software...

    Read More
  • Wed, 3 May 2017 Vulnerability

    Backdoor Flaw Found In Hundreds Of Android Apps

    All
    Backdoor Flaw Found In Hundreds Of Android Apps

    A recent study found that hundreds of Android apps that help users connect to PCs via Wi-Fi...

    Read More
  • Wed, 3 May 2017 Hacking

    OurMine Hacks Unity Game Engine Forum

    OurMine Hacks Unity Game Engine Forum

    The OurMine hacker group defaced the official forum of the Unity cross-platform game engine...

    Read More
  • Wed, 3 May 2017 Trojan

    TrickBot Trojan Now Targets Private Banking

    TrickBot Trojan Now Targets Private Banking

    A new wave of attacks powered by the TrickBot banking Trojan is targeting private banks and investment firms...

    Read More
  • Wed, 3 May 2017 Vulnerability

    Intel Issues Patch for Remote Code Execution Bug in Chips

    Intel Issues Patch for Remote Code Execution Bug in Chips

    Intel has issued a security advisory on a critical flaw that has affected its processors for almost a decade...

    Read More
  • Wed, 3 May 2017 Cyber Security Findings

    Cyber Criminals Breached Over 1 Billion Accounts in 2016

    All
    Cyber Criminals Breached Over 1 Billion Accounts in 2016

    An Internet security threat report revealed that data breaches in 2016 exposed 1.1 billion identities...

    Read More
  • Wed, 19 Apr 2017 Trojan

    Google App Store Security Scan Bypassed By Cyber Criminals

    All
    Google App Store Security Scan Bypassed By Cyber Criminals

    Google security scan was persistently bypassed by cyber criminals to upload the BankBot Trojan...

    Read More
  • Wed, 19 Apr 2017 Spam

    Spam Emails Spreading Java-Based RATs

    All
    Spam Emails Spreading Java-Based RATs

    An ongoing spam email campaign delivers Java-based remote access tools (jRATs) to fully compromise US tax filers' devices...

    Read More
  • Wed, 19 Apr 2017 Phishing

    Widely Used Browsers Vulnerable to Undetectable Phishing Attacks

    All
    Widely Used Browsers Vulnerable to Undetectable Phishing Attacks

    Widely used browsers such as Chrome, Firefox, and Opera are vulnerable to phishing attacks that leverage on a type of homograph attack...

    Read More
  • Wed, 19 Apr 2017 Malware

    Mirai Threatened By New Botnet

    All
    Mirai Threatened By New Botnet

    An Internet-of-things (IoT) malware known as Hajime has been spreading unabated...

    Read More
  • Wed, 19 Apr 2017 Ransomware

    Karmen RaaS Advertised on Hacking Forums

    All
    Karmen RaaS Advertised on Hacking Forums

    A Russian-speaking underground hacking forum is selling Karmen Ransomware-as-a-Service (RaaS). Karmen is based on the Hidden Tear...

    Read More
  • Tue, 18 Apr 2017 Personal Information

    Snapchat User Data Leaked By Indian Hackers

    All
    Snapchat User Data Leaked By Indian Hackers

    Indian hackers have leaked Snapchat's database of 1.7 million users on the dark net...

    Read More
  • Tue, 18 Apr 2017 Phishing

    More Japanese Gamers Conned By Spear Phishing Scams

    More Japanese Gamers Conned By Spear Phishing Scams

    Cyber criminals are stepping up spear phishing emails with fake offers of in-game currency...

    Read More
  • Tue, 18 Apr 2017 Social Media

    McAfee's LinkedIn Page Defaced

    McAfee's LinkedIn Page Defaced

    McAfee's LinkedIn page was recently hacked and defaced by unidentified hackers...

    Read More
  • Tue, 18 Apr 2017 Social Media

    UK Far-Right Group Hit By Hacking Attacks

    UK Far-Right Group Hit By Hacking Attacks

    Unidentified hackers recently hacked and defaced the Twitter account of UK far-right political party...

    Read More
  • Tue, 18 Apr 2017 Cyber Security Findings

    Cerber Overshadows Locky in Q1 2017

    All
    Cerber Overshadows Locky in Q1 2017

    In the first quarter of 2017, Cerber enlarged its share of the ransomware market to 87%...

    Read More
  • Mon, 17 Apr 2017 Hacking

    New Batch of NSA's Hacking Tools Leaked

    New Batch of NSA's Hacking Tools Leaked

    A hacker group known as Shadow Brokers leaked a new batch of tools that supposedly belong to the US National Security Agency...

    Read More
  • Mon, 17 Apr 2017 Phishing

    UK Foreign Office Targeted in Spear Phishing Campaign

    UK Foreign Office Targeted in Spear Phishing Campaign

    Hackers targeted UK's Foreign Office with a spear phishing campaign believed to have begun in April...

    Read More
  • Mon, 17 Apr 2017 Online Scams

    Airbnb Homes Robbed After Booking By Hijacked Accounts

    All
    Airbnb Homes Robbed After Booking By Hijacked Accounts

    Airbnb is cracking down on scammers who robbed homes after hijacking users' accounts...

    Read More
  • Mon, 17 Apr 2017 Zero-Day Exploit

    200,000 Magento Merchants At Risk of Zero-Day Vulnerability

    200,000 Magento Merchants At Risk of Zero-Day Vulnerability

    A popular version of the open source Magento ecommerce platform is vulnerable...

    Read More
  • Mon, 17 Apr 2017 Cyber Security Findings

    Corporations Not Prepared for Mobile Device Breach: Survey

    All
    Corporations Not Prepared for Mobile Device Breach: Survey

    A new survey on mobile device security breaches shows that nearly two-thirds of respondents are doubtful...

    Read More
  • Tue, 11 Apr 2017 Malware

    Sathurbot Botnet Grows By Compromising WordPress Sites

    All
    Sathurbot Botnet Grows By Compromising WordPress Sites

    A 20,000-device strong botnet is probing and compromising WordPress sites to spread a Trojan called Sathurbot...

    Read More
  • Tue, 11 Apr 2017 Cyber Security Guide

    Philippines' Monetary Board to Strengthen Authentication of Clients' Identity

    Philippines’ Monetary Board to Strengthen Authentication of Clients' Identity

    Philippines' monetary board Bangko Sentral ng Pilipinas (BSP) is set to require banks...

    Read More
  • Tue, 11 Apr 2017 Hacking

    Hackers Target Third-Party Sellers On Amazon

    Hackers Target Third-Party Sellers On Amazon

    Hackers are targeting the growing population of third-party sellers on Amazon.com, using stolen credentials...

    Read More
  • Tue, 11 Apr 2017 Hacking

    Hacker Sets Off All Tornado Siren in Dallas

    Hackers Target Third-Party Sellers On Amazon

    A hacker, or group of hackers, set off all 156 tornado sirens in the city of Dallas...

    Read More
  • Tue, 11 Apr 2017 Ransomware

    Achieve Game High Score to Neutralise Ransomware

    Achieve Game High Score to Neutralise Ransomware

    A new ransomware dubbed "Rensenware" forces players to get a high score in a PC game...

    Read More
  • Mon, 10 Apr 2017 Zero-Day Exploit

    Microsoft Word Zero-Day Attack

    Microsoft Word Zero-Day Attack

    A new Microsoft zero-day attack is able to install malware even on a fully patched computer by exploiting a vulnerability...

    Read More
  • Mon, 10 Apr 2017 Malware

    BrickerBot Destroys Unsecured IoT Devices

    All
    BrickerBot Destroys Unsecured IoT Devices

    A new botnet known as BrickerBot permanently destroys poorly configured IoT devices...

    Read More
  • Mon, 10 Apr 2017 Vulnerability

    Amnesia Botnet Targets Vulnerable DVRs

    Amnesia Botnet Targets Vulnerable DVRs

    A new IoT botnet known as Amnesia is exploiting an unpatched remote code execution vulnerability...

    Read More
  • Mon, 10 Apr 2017 Vulnerability

    Matrix Ransomware Spreads Using Desktop Shortcuts

    Matrix Ransomware Spreads Using Desktop Shortcuts

    The Matrix ransomware is sporting a new feature that facilitates its spread to other computers...

    Read More
  • Mon, 10 Apr 2017 Hacking

    Hackers Publish Password for NSA Hacking Tools

    Hackers Publish Password for NSA Hacking Tools

    The Shadow Brokers (TSB) has published the password to a trove of NSA's hacking tools...

    Read More
  • Fri, 7 Apr 2017 Vulnerability

    Apache Struts Exploit Admits Ransomware Onto Servers

    All
    Apache Struts Exploit Admits Ransomware Onto Servers

    Cyber criminals have been exploiting the Apache Struts vulnerability to install the Cerber ransomware...

    Read More
  • Fri, 7 Apr 2017 Ransomware

    Ransomware Attacks Against Healthcare Institutions

    Ransomware Attacks Against Healthcare Institutions

    Ransomware-as-a-service (RaaS) platforms have facilitated attacks against healthcare institutions...

    Read More
  • Fri, 7 Apr 2017 Malware

    40 Countries Targeted By Malware Campaign

    40 Countries Targeted By Malware Campaign

    A cyber criminal group identified as APT-C-23 or Two-Tailed Scorpion has been targeting the education, military and media sectors...

    Read More
  • Fri, 7 Apr 2017 Vulnerability

    Hard-Coded Passwords in SCADA

    Hard-Coded Passwords in SCADA

    Schneider Electric's Supervisory Control and Data Acquisition (SCADA) products were discovered to be embedded with hard-coded passwords...

    Read More
  • Fri, 7 Apr 2017 Cyber Security Guide

    Logic Bomb

    All
    Logic Bomb

    A logic bomb, also known as slag code, is a piece code intentionally inserted into a programme...

    Read More
  • Fri, 24 Mar 2017 Malware

    CIA's Unremovable Malware

    All
    CIA's Unremovable Malware

    The US Central Intelligence Agency's hacking arsenal includes malware that cannot be removed...

    Read More
  • Fri, 24 Mar 2017 Business Email Compromise (BEC)

    Two Tech Companies Lose Over US$100 Million to BEC Scam

    Two Tech Companies Lose Over US$100 Million to BEC Scam

    A Lithuanian man swindled over US$100 million from two US tech companies through a business email compromise (BEC) scam...

    Read More
  • Fri, 24 Mar 2017 Ransomware

    "Blank Slate" Malspam Pushing Cerber Ransomware

    All
    Malspam Pushing Cerber Ransomware

    A malicious spam (malspam) campaign called "Blank Slate" has been spreading the Cerber ransomware...

    Read More
  • Fri, 24 Mar 2017 Malware

    Macro Script Malware Targets Both Windows and Mac OS

    All
    Macro Script Malware Targets Both Windows and Mac OS

    Security researchers have discovered a malicious Word document designed to spread malware...

    Read More
  • Fri, 24 Mar 2017 Cyber Security Guide

    DNS Hijacking

    All
    DNS Hijacking

    DNS hijacking is an attack that overrides the targeted devices' TCP/IP settings and renders the default DNS invalid...

    Read More
  • Wed, 22 Mar 2017 Spam

    World's Largest Botnet Manipulates Stock Market

    World's Largest Botnet Manipulates Stock Market

    The world's largest spam botnet Necurs is back online and is engaged in a spam scheme...

    Read More
  • Wed, 22 Mar 2017 Personal Information

    Mobile Network Operator Hit By Data Breach Again

    All
    Mobile Network Operator Hit By Data Breach Again

    Mobile operator Three has been hit by another data breach...

    Read More
  • Wed, 22 Mar 2017 Hacking

    Hacked Websites on the Rise

    All
    Hacked websites

    Google painted a bleak picture of cyber security trends in a post on its webmaster blog...

    Read More
  • Wed, 22 Mar 2017 Vulnerabilities

    Cisco Issues Advisory On Flaw in Hundreds of Switches

    All
    Cisco Issues Advisory On Flaw in Hundreds of Switches

    Cisco has issued a security advisory for a bug in the cluster management protocol...

    Read More
  • Wed, 22 Mar 2017 Malware

    Stealthy Backdoor in Chinese PUPs

    All
    Chinese PUPs

    Chinese programmers have developed a stealthy backdoor in Potentially Unwanted Programmes (PUPs) to load unsigned drivers...

    Read More
  • Tue, 21 Mar 2017 Hacking

    'Anonymous' to Target Central Banks for Cash

    'Anonymous' to Target Central Banks for Cash

    Hacker group Anonymous is believed to have focused their attacks on central banks...

    Read More
  • Tue, 21 Mar 2017 Personal Information

    McDelivery Leaks 2.2 Million Customers' Data

    McDelivery Leaks 2.2 Million Customers' Data

    India's McDonald's delivery service is leaking customers' information from an insecure API endpoint...

    Read More
  • Tue, 21 Mar 2017 Cyber Attacks

    DNS Attack Used to Fake Contact Between Russian Bank and Trump

    DNS Attack Used to Fake Contact Between Russian Bank and Trump

    Russian bank Alfa said that it was targeted in a DNS botnet attack that uses its IPs to spoof communication...

    Read More
  • Tue, 21 Mar 2017 Cyber Attacks

    String of Attacks Possibly Tied to Single Hacker Group

    All
    String of Attacks Possibly Tied to Single Hacker Group

    A string of attacks in the past few months was attributed to a single cyber actor group...

    Read More
  • Tue, 21 Mar 2017 Insider Threat

    Former IT Admin Plants Backdoor to Steal Information

    All
    Former IT Admin Plants Backdoor to Steal Information

    Colombia Sportswear is suing its former IT administrator for stealing information...

    Read More
  • Mon, 20 Mar 2017 Distributed Denial-of-Service (DDoS)

    DDoS Attacks Target Taiwan Hi-Tech Firms

    DDoS Attacks Target Taiwan Hi-Tech Firms

    Majority of Distributed Denial-of-Service (DDoS) attacks launched between 15 February to 14 March this year...

    Read More
  • Mon, 20 Mar 2017 Cyber Security Findings

    Korea: 6th Top Target of Mobile Malware Attacks

    All
    Korea: 6th Top Target of Mobile Malware Attacks

    South Korea was sixth most targeted by mobile malware in the world...

    Read More
  • Tue, 14 Mar 2017 Malware

    Danish-Speaking Users Infected By Malware Spread via Dropbox

    All
    Users Infected By Malware Spread via Dropbox

    Danish-speaking users in Denmark, Germany, and several Scandinavian countries were hit by a malware attack...

    Read More
  • Tue, 14 Mar 2017 Malware

    Malware Pre-Installed On Android Phones

    All
    Malware Pre-Installed On Android Phones

    An outbreak of malware was pre-installed on 38 Android devices...

    Read More
  • Mon, 13 Mar 2017 Malware

    New IoT Malware

    All
    New IoT Malware

    A new malware known as ELF_IMEIJ.A is turning cloud-enabled AVTech devices into a Distributed Denial-of-Service (DDoS) botnet...

    Read More
  • Mon, 13 Mar 2017 Vulnerability

    Canada Revenue Agency Website Down Following Potential Security Risk

    Canada Revenue Agency Website Down Following Potential Security Risk

    Canada Revenue Agency (CRA) has suspended some of its online services, including tax-filing options, due to a security threat...

    Read More
  • Mon, 13 Mar 2017 Cyber Security Findings

    Exploit Kit Activity Declined

    All
    Exploit Kit Activity Declined

    A recent report revealed that exploit kit (EK) has declined in popularity due to improved protections...

    Read More
  • Mon, 13 Mar 2017 Hacking

    UK Warns Political Parties About Russian Hacking Threat

    UK Warns Political Parties About Russian Hacking Threat

    UK intelligence services warned that cyber attackers would target UK's political system and parties...

    Read More
  • Mon, 13 Mar 2017 Personal Information

    Fake Chrome Steals Credit Card Details

    All
    Fake Chrome Steals Card Details

    An application disguises as Google Chrome browser to steal credit card payment details...

    Read More
  • Fri, 10 Mar 2017 Malware

    Governments Extorted for Political Statements

    Governments Extorted for Political Statements

    Middle Eastern governments are targeted by attacks using a previously unseen ransomware...

    Read More
  • Fri, 10 Mar 2017 Zero-Day Exploit

    Zero-Day Vulnerability Leaves Apache Struts Open to Hijack

    All
    Zero-Day Vulnerability Leaves Apache Struts Open to Hijack

    Attackers are targeting companies which use Apache Struts, an open-source web application framework...

    Read More
  • Fri, 3 Mar 2017 Cyber Security Findings

    Network Defenders Constrained By Bureaucracy

    All
    network defenders constrained

    A recent survey revealed that cyber criminals have an edge over network defenders...

    Read More
  • Fri, 3 Mar 2017 Malware

    132 Malicious Apps on Google Play

    All
    Malicious apps

    132 Android apps on the Google Play store were found to contain malicious coding...

    Read More
  • Fri, 3 Mar 2017 Cyber Security Guide

    Cyber Criminals Target Data-Rich Smartphones

    All
    Smartphones

    Cyber criminals are increasingly targeting smartphones as they contain key information...

    Read More
  • Fri, 3 Mar 2017 Trojan

    PowerShell Trojan Uses DNS for Bidirectional Communication

    All
    Trojan

    An elusive malware is being distributed via spam emails attached with a malicious MS Word...

    Read More
  • Fri, 3 Mar 2017 Cyber Security Guide

    Telephony Denial-of-Service

    All
    TDoS

    Telephony Denial-of-Service (TDoS) occurs when an attacker overwhelms the telephone system...

    Read More
  • Thu, 2 Mar 2017 Personal Information

    Japan: More Than 12 Million Records Leaked in 2016

    All
    Records leaked

    Japan reported that approximately 12.6 million records of personal information were leaked...

    Read More
  • Thu, 2 Mar 2017 Hacking

    Lotte's Chinese Website Hacked By Virus

    Website hacked by virus

    South Korean retailer Lotte Group's Chinese website was hacked using an unidentified virus...

    Read More
  • Thu, 2 Mar 2017 Cyber Security Findings

    68% of Oil and Gas Firms Suffered Digital Attacks

    oil and gas suffered attacks

    Research shows that 68% of oil and gas firms in the United States have experienced at least one digital attack...

    Read More
  • Thu, 2 Mar 2017 Malware

    Dridex 4.0 First to Adopt AtomBombing Technique

    Dridex 4.0

    Dridex's latest 4.0 variant changed the way malicious code is loaded into the host's memory...

    Read More
  • Thu, 2 Mar 2017 Ransomware

    Spam Emails Carry TorrentLocker Ransomware

    All
    TorrentLocker

    In February, Denmark users were hit by spam emails embedded with malicious macros...

    Read More
  • Wed, 1 Mar 2017 Vulnerability

    Critical SQL Injection Vulnerability in WordPress Plugin

    All
    SQL Injection Vulnerability in WordPress Plugin

    Researchers have discovered a SQL injection vulnerability in WordPress' NextGEN Gallery plugin...

    Read More
  • Wed, 1 Mar 2017 Vulnerability

    Google Discloses Unpatched Microsoft Edge and IE Bug

    All
    Google Discloses Unpatched Microsoft Edge and IE Bug

    Google has released details about a Microsoft zero-day bug affecting Internet Explorer and Edge...

    Read More
  • Wed, 1 Mar 2017 Phishing

    Racketeers Send Fake Ransomware Threats

    All
    Racketeers Send Fake Ransomware Threats

    Racketeers are sending victims fake ransomware emails that threaten to hold their files hostage...

    Read More
  • Wed, 1 Mar 2017 Cyber Security Findings

    Ransomware Take Out Victoms For At Least A Week

    All
    Ransomware Take Out Victoms For At Least A Week

    Studies have found that a vast majority of businesses hit by ransomware were locked out of crucial files...

    Read More
  • Wed, 1 Mar 2017 Personal Information

    CloudPets Voice Messages and Passwords Exposed

    CloudPets Voice Messages and Passwords Exposed

    More than 2 million voice recordings of children and parents and 800,000 account login credentials were exposed...

    Read More
  • Tue, 21 Feb 2017 Cyber Security Findings

    Business Emails More Prone to Cyber Threats

    All
    business email threat

    A recent study revealed that business emails are more prone to receiving cyber threats...

    Read More
  • Tue, 21 Feb 2017 Cyber Security Findings

    Improving Endpoint Security

    All
    endpoint security

    Increasingly, modern computing endpoints are operating remotely, allowing attackers to target vulnerable applications...

    Read More
  • Tue, 21 Feb 2017 Trojan

    Hacking Threats From Fake Android App

    All
    fake android app

    A new Android Trojan known is being distributed on third-party app store...

    Read More
  • Tue, 21 Feb 2017 Phishing

    Cyber Espionage Campaign Targets 70 Organisations

    All
    cyber espionage

    A cyber espionage campaign targeted at least 70 organisations across industries...

    Read More
  • Tue, 21 Feb 2017 Hacking

    Asiana Airlines' Website Defaced

    airline website defaced

    South Korea's Asiana Airlines' website was down for 4 hours after hackers defaced it...

    Read More
  • Mon, 20 Feb 2017 Vulnerability

    JavaScript Exploit Bypasses ASLR Protection

    All
    javascript exploit

    Security researchers have discovered a flaw that allows hackers to bypass the ASLR protection...

    Read More
  • Mon, 20 Feb 2017 Malware

    Hospital Devices Face Advanced Threat

    healthcare devices face malware threat

    A new version of the medical device hijack (MEDJACK) malware poses a zero-day threat...

    Read More
  • Wed, 15 Feb 2017 Cyber Security Findings

    Australia Among Top 10 Countries for Hosting Phishing URLs

    All
    Australia in Top 10 for Hosting High-Risk URLs

    A study indicates that Australia ranks among the top ten countries for hosting high-risk URLs...

    Read More
  • Fri, 10 Feb 2017 Personal Information

    Retail Giant Keeps Mum On Data Breach

    Data breach

    UK retail giant Sports Direct was hacked in September 2016, and 30,000 employee records were exposed...

    Read More
  • Tue, 7 Feb 2017 Personal Information

    InterCon's Payment System Breached

    All
    payment systems breached

    InterContinental Hotels Group (IHG) confirmed that its payment systems in 12 US hotels were infected...

    Read More
  • Tue, 7 Feb 2017 Hacking

    Hacker Exposes Phone Hacking Tools

    All
    phone hacking tools

    The hacker who stole 900GB of data from Israeli mobile data extraction company...

    Read More
  • Tue, 7 Feb 2017 Hacking

    Anonymous Group Takes Down the Dark Web

    All
    Anonymous hacking

    The Anonymous Group hacked a Dark Web hosting provider, Freedom Hosting II (FHII), shutting down more than 10,000 Tor-based websites...

    Read More
  • Tue, 7 Feb 2017 Personal Information

    700,000 Hacked Police Forum Accounts for Sale

    Police forum accounts for sale

    A hacker is selling the credentials of 700,000 user accounts from the PoliceOne.com forum...

    Read More
  • Tue, 7 Feb 2017 Cyber Security Findings

    Cyber Fraud Costs UK Retailers £100 Million

    cost of cyber frauds

    A recent survey on retail crimes in the UK reveals that cyber fraud accounts for 53% of total fraud...

    Read More
  • Tue, 31 Jan 2017 Phishing

    PayPal Users Targeted By New Phishing Campaign

    paypal phishing

    A new phishing campaign has set up convincing fake websites and sent out slick emails to trick PayPal users...

    Read More
  • Tue, 31 Jan 2017 Ransomware

    Police Camera Network Held for Ransom

    Ransomware in Police Cameras

    Hackers planted ransomware in police surveillance cameras throughout the city...

    Read More
  • Tue, 31 Jan 2017 Cyber-terrorism

    Jihadi Cyber Attack A Real Threat

    All
    cyber attack

    Experts warned that a jihadi cyber attack is a real threat and can shut down power grids...

    Read More
  • Tue, 31 Jan 2017 Ransomware

    Ransomware Hits Hotel Electronic Key Lock System

    All
    Ransomware in hotel key lock system

    A ransomware hit an Austrian hotel's computer, which manages the hotel's electronic key lock system...

    Read More
  • Tue, 31 Jan 2017 Malware

    Malware in Fake Banking Emails Steals Data and Bitcoins

    Malware in banking emails

    Researchers have discovered a new malware which steals passwords and bitcoins from crypto-currency wallets...

    Read More
  • Fri, 27 Jan 2017 Trojan

    Trojan Transforms Linux Devices into Proxies for Malicious Traffic

    All
    trojan

    A new Trojan known as Linux.Proxy.10 is turning Linux devices into proxy servers...

    Read More
  • Fri, 27 Jan 2017 Hacking

    Dark Web Marketplace Hacked

    All
    dark web

    Popular dark web market AlphaBay's list of user IDs and usernames, along with 218,000 personal messages...

    Read More
  • Fri, 27 Jan 2017 Ransomware

    RoT: Ransomware of Things

    All
    ransomware of things

    Cyber researchers have warned that the ransomware threat could evolve to target connected devices...

    Read More
  • Fri, 27 Jan 2017 Cyber Security Guide

    Pivot Attack

    All
    pivot attack

    In a pivot attack, the hacker gains foothold in a lower security host...

    Read More
  • Fri, 27 Jan 2017 Cyber Security Findings

    4.2 Billion Records Exposed in 2016

    All
    records exposed

    More than 4.2 billion records were exposed in 2016, up four times from the previous high...

    Read More
  • Thu, 26 Jan 2017 Malware

    Bogus Plugin Redirects to Porn Sites

    All
    fake plugin

    A bogus version of the bbPress plugin was uploaded onto compromised WordPress sites...

    Read More
  • Thu, 26 Jan 2017 Ransomware

    Charger Ransomware Locks Android Phone

    All
    Ransomware

    The new Charger ransomware has been found embedded in a mobile application called EnergyRescue...

    Read More
  • Thu, 26 Jan 2017 Vulnerability

    223 Flaws Found in Security Products

    All
    Flaws in security products

    Since July 2016, researchers discovered 223 flaws in 11 global security...

    Read More
  • Thu, 26 Jan 2017 Trojan

    SpyNote Trojan Impersonates Netflix App

    All
    Trojan

    Recently, researchers have discovered a fake Netflix application, which is embedded with...

    Read More
  • Thu, 26 Jan 2017 Trojan

    Japanese Spam Campaign Delivers Trojan

    All
    spam campaign

    Japanese spam emails recently contain a zipped attachment that delivers the Ursnif...

    Read More
  • Wed, 25 Jan 2017 Trojan

    Improved AndroRAT Malware Surges in Activity

    All
    malware

    Android malware AndroRAT has recently surged in activity...

    Read More
  • Wed, 25 Jan 2017 Malware

    Millions Infected with HummingWhale Malware

    All
    android malware

    The HummingBad Android malware, which infected more than 10 million devices...

    Read More
  • Wed, 25 Jan 2017 Vulnerability

    200,000 Servers and Devices Still Affected by Critical Bug

    All
    vulnerability to bug

    According to Internet of Things (IoT) search engine Shodan, nearly 200,000 servers and devices are vulnerable...

    Read More
  • Wed, 25 Jan 2017 Hacking

    Government Website Hacked Amid Political Standoff

    website hacking

    The Gambian government website was hacked after the incumbent president Yahya Jammeh...

    Read More
  • Wed, 25 Jan 2017 Malware

    Disk-Wiping Malware Resurfaces

    malware

    The Shamoon 2.0 disk-wiping malware has resurfaced, targeting Saudi government agencies...

    Read More
  • Tue, 24 Jan 2017 Cyber Attacks

    FBI Probing Cyber Attack on Film Festival

    cyber attack

    The FBI is investigating a cyber attack on 21 January targeting the Sundance Film Festival...

    Read More
  • Tue, 24 Jan 2017 Phishing

    Employment Scam Targets College Students

    Scam

    The FBI has warned that an ongoing online scam is tricking college students into depositing fraudulent checks...

    Read More
  • Tue, 24 Jan 2017 Ransomware

    Gambling Site Hacked With Dharma Ransomware

    Ransomware attack on horse racing website

    A popular Indian horse racing website (Racingpulse.in) was hacked on 17 January and held ransom...

    Read More
  • Tue, 24 Jan 2017 Hacking

    Hacked New York Times Tweet: Russia to Attack US With Missile

    Twitter hacking

    The New York Times Video Twitter account (NYTVideo) posted a fake news tweet on 22 January about Russia...

    Read More
  • Tue, 24 Jan 2017 Distributed Denial-of-Service (DDoS)

    Massive DDoS Disrupts Banking Services

    DDoS

    Major UK bank, Lloyds Banking Group, suffered a massive Distributed Denial-of-Service (DDoS) attack...

    Read More
  • Mon, 23 Jan 2017 Cyber Security Findings

    Mobile Wallets and PoS Devices Targeted

    attacks on digital payment platforms

    Mobile wallets and Point of Sale (PoS) devices in India have become cyber attack targets...

    Read More
  • Mon, 23 Jan 2017 Ransomware

    New Ransomware Demands Credit Details

    new ransomware

    A new ransomware family, detected as Android/Locker.FK!tr, locks access to the device...

    Read More
  • Mon, 23 Jan 2017 Trojan

    New Variation of BankBot Developed

    Trojan

    Threat actors recently used the leaked source code of an unnamed Android banking Trojan...

    Read More
  • Mon, 23 Jan 2017 Ransomware

    New RaaS Customises Satan Ransomware

    All
    Satan RaaS

    The new Satan Ransomware as a Service (RaaS) allows threat actors to create customised versions...

    Read More
  • Mon, 23 Jan 2017 Cyber Attacks

    Russia Suffers Cyber Attacks Every Day

    Cyber attacks

    A Russian presidential spokesperson said that Russia suffers hundreds and thousands of cyber attacks...

    Read More
  • Fri, 20 Jan 2017 Cyber Security Guide

    What is Footprinting?

    All
    footprinting

    Footprinting, also known as reconnaissance, is the process of collecting information...

    Read More
  • Fri, 20 Jan 2017 Personal Information

    Translation Firm Exposes Sensitive Data

    All
    security lapse exposes data

    Network attached storage (NAS) devices used by US-based translation firm Interpreters Unlimited were found...

    Read More
  • Fri, 20 Jan 2017 Ransomware

    Open Source Databases Wiped Out

    All
    databases wiped out

    The databases of open source data software CouchDB and Hadoop were recently controlled and deleted...

    Read More
  • Fri, 20 Jan 2017 Malware

    Fruitfly Malware Hits Biomedical Research Centres

    malware

    The new Fruitfly malware has been targeting Mac systems of biomedical research centres...

    Read More
  • Fri, 20 Jan 2017 Malware

    Fake Font Updates Infect Chrome Users

    All
    fake font updates infect chrome users

    A new social engineering campaign lures Google Chrome users to download fake font update packages...

    Read More
  • Thu, 19 Jan 2017 Malware

    New Malware Takes Control and Steals Data

    All
    malware

    Researchers discovered the new GhostAdmin malware that enables attackers to control infected computers...

    Read More
  • Thu, 19 Jan 2017 Vulnerability

    Unpatched Vulnerability in Samsung Smartcam

    All
    vulnerability

    In a recent security investigation of the Samsung Smartcam, researchers discovered that the PHP files...

    Read More
  • Thu, 19 Jan 2017 Hacking

    Charity's Server Data Deleted

    All
    charity data deleted

    A hacker identified as TheDarkOverLord recently deleted all the data in the server and physical backups...

    Read More
  • Thu, 19 Jan 2017 Phishing

    Phishing Attacks Lead to Fake Naver Portal

    All
    Naver phishing

    In recent spear phishing attacks targeting North Korean analysts, defectors, and North Korean human rights organisations...

    Read More
  • Thu, 19 Jan 2017 Cyber Security Findings

    Singapore: One in Four Cyber Attacks Succeed

    All
    one in four cyber attacks succeed

    A recent survey shows that one in four cyber attacks targeted at Singapore companies succeed...

    Read More
  • Wed, 18 Jan 2017 Personal Information

    £1 Million At Risk After Credential Leak

    Credential leak

    A group of fraudsters were arrested for sourcing and using leaked login credentials from the dark web...

    Read More
  • Wed, 18 Jan 2017 Personal Information

    Yahoo Breach Compromises Government Officials

    data breach

    The 2013 Yahoo breach leaked more than 3,000 credentials linked to high-profile Australian government officials...

    Read More
  • Wed, 18 Jan 2017 Cyber Attacks

    Scandal Investigators Cyber Attacked

    cyber attacks

    The special investigation team probing South Korea President Park Geun Hye’s political scandal recently suffered a cyber attack...

    Read More
  • Wed, 18 Jan 2017 Ransomware

    Spam Emails Deliver Kovter and Locky

    All
    Spam delivers ransomware

    The Kovter ad fraud Trojan has been distributed with Locky ransomware in spam emails...

    Read More
  • Wed, 18 Jan 2017 Trojan

    DroidJack RAT Poses As Super Mario App

    All
    Trojan poses as Super Mario app

    The DroidJack Remote Access Trojan (RAT) has been found posing as the Super Mario Android application...

    Read More
  • Tue, 17 Jan 2017 Phishing

    Highly Effective Gmail Phishing Technique

    All
    Phishing

    In a recent phishing campaign targeting Gmail users, attackers use compromised accounts to distribute emails...

    Read More
  • Tue, 17 Jan 2017 Phishing

    Return of the Hancitor Spam Campaign

    All
    spam campaign

    The Hancitor spam campaign, which typically deploys Visual Basic (VB) macros to deliver malware...

    Read More
  • Tue, 17 Jan 2017 Cyber Security Findings

    HKPC Caution Comes After 506% Increase in Ransomware

    All
    rise in ransomware

    On 16 January 2017, the Hong Kong Productivity Council (HKPC) urged organisations and the public to protect themselves...

    Read More
  • Tue, 17 Jan 2017 Malware

    UK Hospital Trust Hit By Malware Attack

    malware attack

    Barts Health Trust, UK’s largest National Health Service (NHS) Trust which runs six London hospitals, recently suffered a malware attack...

    Read More
  • Tue, 17 Jan 2017 Hacking

    SWIFT Systems of Indian Banks Compromised

    SWIFT systems compromised

    Hackers recently compromised the SWIFT systems of three Indian banks...

    Read More
  • Mon, 16 Jan 2017 Phishing

    Turkish Instagram Password Thieves Discovered

    All
    Instagram password thieves

    Several Instagram password-stealing applications targeting Turkish Instagram users...

    Read More
  • Mon, 16 Jan 2017 Hacking

    Group Which Hacked NSA Retires

    All
    Hackers

    Hacker group Shadow Brokers, who pilfered hacking tools from the US National Security Agency (NSA)...

    Read More
  • Mon, 16 Jan 2017 Personal Information

    Israeli Mobile Forensics Firm Hacked

    All
    Hackers

    Israeli mobile forensics firm Cellebrite was breached after hackers pilfered 900 gigabytes of data...

    Read More
  • Mon, 16 Jan 2017 Cyber Security Findings

    New Cross-Browser Fingerprinting Techniques Identified

    All
    cross-browser fingerprinting (CBF) techniques

    New cross-browser fingerprinting (CBF) techniques have been identified to track users...

    Read More
  • Mon, 16 Jan 2017 Ransomware

    Unpatched Vulnerabilities End With Ransomware Infection

    All
    Ransomware exploits unpatched vulnerabilities

    The RIG exploit kit recently infected victims with the Cerber ransomware...

    Read More
  • Fri, 13 Jan 2017 ATMs

    New ATM Malware Variant Hits Latin America

    ATM malware

    Ploutus ATM malware's latest variant, Ploutus-D, was found to be targeting the Kalignite...

    Read More
  • Fri, 13 Jan 2017 Phishing

    EyePyramid Malware Spreads via Phishing

    All
    malware

    Italian police recently arrested two siblings for infecting email accounts and stealing sensitive data...

    Read More
  • Fri, 13 Jan 2017 Malware

    Nuke Malware for Sale on Dark Web

    All
    malware

    A new malware dubbed Nuke is up for sale on the dark web by an alleged Russian hacker...

    Read More
  • Fri, 13 Jan 2017 Cyber Security Guide

    What is Sender Policy Framework?

    All
    Sender Policy Framework

    Sender Policy Framework (SPF) is an anti-spam mechanism that authenticates the Internet domain of email senders...

    Read More
  • Fri, 13 Jan 2017 Personal Information

    Government Employees' Financial Data Leaked

    Financial data leaked

    On 10 January 2017, financial data of more than 2,000 Taipei City Government employees were leaked...

    Read More
  • Thu, 12 Jan 2017 Hacking

    Websites Defaced By Religious Hacktivists

    websites defaced

    Religious hacktivist group Tunisian Fallaga Team defaced websites in Australia, Russia...

    Read More
  • Thu, 12 Jan 2017 Personal Information

    Anonymous Leaks Job Portal Data

    Job portal data leak

    As part of its ongoing protests against the Thai government's Internet surveillance legislations...

    Read More
  • Thu, 12 Jan 2017 Personal Information

    Siblings Hacked Tens of Thousands Email Accounts

    All
    email hacking

    Italian police recently arrested two siblings for hacking into tens of thousands of email accounts...

    Read More
  • Thu, 12 Jan 2017 Ransomware

    Spora Ransomware Capable of Offline Complex Encryption

    All
    ransomware

    A new ransomware family called Spora exhibits notable features...

    Read More
  • Thu, 12 Jan 2017 Malware

    New Remote Overlay Malware Targets Banks

    malware targets banks

    A recently discovered malware, Client Maximus, is designed to attack Brazilian banks...

    Read More
  • Wed, 11 Jan 2017 Phishing

    Netflix Phishing Adopts Anti-Detection Tactic

    phishing

    Researchers discovered a phishing campaign in the wild targeting United States Netflix...

    Read More
  • Wed, 11 Jan 2017 Cyber Security Solutions

    St. Jude Medical Releases Patches for Devices

    patch for medical device

    St. Jude Medical recently released patches for the Merlin@home Transmitter medical device...

    Read More
  • Wed, 11 Jan 2017 Ransomware

    Ransomware Drops DiamondFox Malware

    All
    ransomware

    New variants of the Merry Christmas ransomware are dropping the DiamondFox malware...

    Read More
  • Wed, 11 Jan 2017 Hacking

    World's Largest Poker Forum Hacked

    forum hacking

    Hackers breached TwoPlusTwo, the world's largest poker forum...

    Read More
  • Wed, 11 Jan 2017 Hacking

    Hackers Hit Journalist Union Website

    website hacking

    Unidentified hackers hit the National Union of Journalists of the Philippines website...

    Read More
  • Tue, 10 Jan 2017 Trojan

    Shifu Banking Trojan Gains New Infection and Anti-Detetion Techniques

    banking trojan

    The Shifu banking Trojan, which pilfers banking credentials, adopted multiple new infection and anti-detection techniques...

    Read More
  • Tue, 10 Jan 2017 Trojan

    Fake Super Mario App Delivers Trojan

    All
    app delivers trojan

    Researchers have discovered a fake Super Mario Run Android application that delivers the Marcher banking Trojan...

    Read More
  • Tue, 10 Jan 2017 Advanced Persistent Threat (APT)

    Iranian APT Sends Digitally Signed Malware

    All
    malware

    In recent attacks, Iranian advanced persistent threat (APT) group OilRig...

    Read More
  • Tue, 10 Jan 2017 Hacking

    Community Service Bank Account Hacked

    All
    bank account hacking

    US organisation Manila Community Services District lost approximately US$42,000 (S$60,304)...

    Read More
  • Tue, 10 Jan 2017 Cyber Attacks

    Turkey Points Power Outage to US Attacks

    cyber attacks

    Turkey said that recent power outages were caused by cyber attacks...

    Read More
  • Mon, 9 Jan 2017 Advanced Persistent Threat (APT)

    APT Group Deploys Malware Against Japanese

    APT

    The DragonOK advanced persistent threat (APT) group has been deploying Sysget, TidePool, and IsSpace malware...

    Read More
  • Mon, 9 Jan 2017 Malware

    Student Arrested for Malware Attack on School Network

    student arrested for malware attack

    A University of Alberta student has been arrested for infecting the school's network with malware...

    Read More
  • Mon, 9 Jan 2017 Ransomware

    New KillDisk Ransomware Variant Targets Linux

    All
    ransomware

    The latest KillDisk ransomware variant renders Linux machines unbootable...

    Read More
  • Mon, 9 Jan 2017 Online Scams

    Scam Page Triggers DoS Attacks on Mac OS

    All
    scam

    Mac users are targeted in a new tech support scam that can cause a Denial-of-Service (DoS)...

    Read More
  • Mon, 9 Jan 2017 Trojan

    Backdoor Returns As BigBoss and SillyGoose

    All
    backdoor

    Researchers have discovered two new versions of the MM Core backdoor...

    Read More
  • Fri, 6 Jan 2017 Vulnerability

    Printer Security Often Overlooked

    All
    printer security

    Printers have been often overlooked when it comes to security despite being vulnerable...

    Read More
  • Fri, 6 Jan 2017 ATMs

    Taiwan and Europe ATM Heists Linked

    ATM hacking

    Hacker group Cobalt, which stole more than US$2 million (S$2.86 million) from Taiwan's First Commercial Bank ATMs...

    Read More
  • Fri, 6 Jan 2017 Ransomware

    New Ransomware Armed With DDoS Function

    All
    DDoS ransomware

    A new ransomware family called FireCrypt can encrypt computer files and launch a weak Distributed Denial-of-Service (DDoS)...

    Read More
  • Fri, 6 Jan 2017 Ransomware, Cyber Security Solutions

    Globe Ransomware V3 Decryptor Released

    All
    ransomware

    The decryptor for version three of the Globe ransomware has been released...

    Read More
  • Fri, 6 Jan 2017 Cyber Security Guide

    What is Polymorphic Malware?

    All
    Polymorphic Malware

    Polymorphic malware is a harmful computer software that constantly changes to evade detection...

    Read More
  • Thu, 5 Jan 2017 Malware

    Malicious WhatsApp Links from Neighbour Country

    All
    WhatsApp

    Pakistan has issued an advisory warning mobile users of malicious links masquerading as links...

    Read More
  • Thu, 5 Jan 2017 Phishing

    Phishing Email Quotes New Year Speech

    Phishing

    One day after North Korean leader Kim Jong Un's televised New Year speech, North Korean hackers sent phishing emails...

    Read More
  • Thu, 5 Jan 2017 Hacking

    Canadian Utility's IP Address Compromised By Russian Hackers

    Hacking

    During an investigation into the alleged hacking of the US Democratic National Committee, the US Department...

    Read More
  • Thu, 5 Jan 2017 Ransomware

    UK School Employees Targeted in Ransomware Attacks

    Ransomware targets school

    Fraudsters pretending to be officials from the UK Department of Education are calling up schools...

    Read More
  • Thu, 5 Jan 2017 Personal Information

    Confidential Box.com Files Found on Search Engines

    All
    data leak

    The confidential files of online file sharing and content management provider Box.com were found via Google, Bing...

    Read More
  • Wed, 4 Jan 2017 Hacking

    New Junk Messages Distraction Tactic

    Attack on share trading users

    In a new attack tactic aimed at Hong Kong share trading users, hackers overwhelm victims with junk text messages...

    Read More
  • Wed, 4 Jan 2017 Hacking

    Human Rights Commission Website Taken Offline

    All
    Hacking

    The Victorian Equal Opportunity and Human Rights Commission website was recently hacked...

    Read More
  • Wed, 4 Jan 2017 Cyber Security Findings

    Street Crime Falls, Cyber Crime Rises

    All
    Cyber crime rates

    Thailand saw a decline in street crime rate and a surge in cyber crime in 2016...

    Read More
  • Wed, 4 Jan 2017 ATMs

    Man Arrested for ATM Skimming

    ATM Skimming

    A Bulgarian man was recently arrested by the police in the Philippines for ATM skimming...

    Read More
  • Wed, 4 Jan 2017 Malware

    Russian Malware Code Discovered in US Power Utility Laptop

    Malware

    The US-based Burlington Electric Department (BED) recently discovered malware, which was distributed by...

    Read More
  • Tue, 3 Jan 2017 Hacking, Ransomware

    India-Pakistan Cyber Tit-for-Tat Continues

    Attacks on airports

    After the websites of two Indian airports were defaced by Pakistani hacker group...

    Read More
  • Tue, 3 Jan 2017 Vulnerability

    Smartphone Bank Vulnerable to Hacking

    All
    Smartphone bank vulnerability

    Users of German smartphone bank N26’s mobile application could have their data exposed...

    Read More
  • Tue, 3 Jan 2017 Advanced Persistent Threat (APT)

    Suspected Russian Cyber Hostilities Against Ukraine

    APT

    Ukrainian state institutions were hit by 6,500 cyber attacks...

    Read More
  • Tue, 3 Jan 2017 Cyber Security Findings

    London Expects Surge in Cyber Insurance

    All
    Cyber Insurance

    The London insurance market is expecting a surge in cyber insurance policies in 2017...

    Read More
  • Tue, 3 Jan 2017 Vulnerability

    Beware of Gift Card Hacking

    All
    gift card hacking

    Consumers are cautioned against buying gift cards from store racks, where criminals can easily copy...

    Read More
  • Fri, 30 Dec 2016 Trojan

    New Android Trojan Targets Wireless Routers

    All
    Trojan

    A new Android Trojan called Switcher has been found to use infected Android devices...

    Read More
  • Fri, 30 Dec 2016 Malware

    Exploit Kit Updated With Steganography Technique

    All
    Exploit kit

    The recently updated Sundown exploit kit now uses steganography techniques to store pilfered information...

    Read More
  • Fri, 30 Dec 2016 Ransomware

    KillDisk Malware Evolves Into Ransomware

    All
    Ransomware

    The KillDisk malware has evolved into a ransomware, and is currently distributed via malicious attachments...

    Read More
  • Fri, 30 Dec 2016 Cyber Security Guide, Trojan

    What Is Wiretap Trojan?

    All
    Trojan

    A wiretap Trojan is a malicious espionage programme that stealthily records...

    Read More
  • Thu, 29 Dec 2016 Hacking

    Two Airport Websites Defaced

    Airlines

    The official websites of the Cochin and Thiruvananthapuram airports in India were defaced...

    Read More
  • Thu, 29 Dec 2016 Vulnerability

    Singapore: IoT Devices Become New Targets of Attacks

    All
    IoT Devices

    Internet of Things (IoT) devices are very vulnerable to cyber attacks because...

    Read More
  • Thu, 29 Dec 2016 Malware

    Chinese Hackers Charged for Profiting from Pilfered Info

    All
    Hackers charged for making unlawful profits

    Three Chinese hackers were recently charged for making unlawful profits from information on corporate mergers...

    Read More
  • Wed, 28 Dec 2016 Phishing

    New Phishing Campaign to Steal Credit Details

    All
    Phishing

    Researchers have discovered a new phishing campaign that distributes malicious HTML documents...

    Read More
  • Wed, 28 Dec 2016 Hacking

    Thai Police Arrests Nine for Protest Hack

    Hacking

    Thai police has arrested nine people suspected of hacking and taking down several Thai government websites...

    Read More
  • Wed, 28 Dec 2016 Vulnerability

    Airline Bookings Easily Tampered With

    Airlines

    Researchers warn that hackers can easily tamper with airline bookings and put travellers on the wrong plane...

    Read More
  • Tue, 27 Dec 2016 Ransomware

    Read Two Ransomware Articles Or Lose All Your Files

    All
    Ransomware

    A new variant of the Koolova Ransomware will encrypt your files and decrypt them for free...

    Read More
  • Tue, 27 Dec 2016 Ransomware

    Ransomware Campaign Uses Stealthy Malware Cocktail

    All
    Ransomware

    The ongoing Cerber Ransomware campaign uses a stealthy malware cocktail to drive infection rates...

    Read More
  • Tue, 27 Dec 2016 Vulnerability

    Top 4 Vulnerable Industries in 2017

    All
    Most vulnerable industries

    The top 4 industries most vulnerable to cyber attacks in 2017 are the gaming industry...

    Read More
  • Fri, 23 Dec 2016 Hacking

    Fraudsters Target Groupon Users

    All
    Groupon

    UK users of voucher site Groupon were targeted by fraudsters who used their login credentials to make unauthorised purchases...

    Read More
  • Fri, 23 Dec 2016 Distributed Denial-of-Service (DDoS)

    New DDoS Attack on Social Networking Website

    All
    Tumblr

    US social networking website Tumblr was taken down in what appeared to be a new Distributed Denial-of-Service...

    Read More
  • Fri, 23 Dec 2016 Hacking

    Netflix, Marvel, and NFL's Twitter Accounts Hacked

    All
    Twitter

    On 21 December 2016, hacker group OurMine hacked the Twitter accounts of Netflix US...

    Read More
  • Fri, 23 Dec 2016 Cyber Security Guide

    Cyber Definition: Password Authentication Protocol (PAP)

    All
    Password Authentication Protocol

    Password Authentication Protocol (PAP) is a simple authentication protocol in which the user name and password are sent...

    Read More
  • Thu, 22 Dec 2016 ATMs

    New ATM Malware Releases Cash to Hackers

    ATM Malware

    A newly discovered ATM malware, Alice, plunders cash from ATMs through the dispenser device...

    Read More
  • Thu, 22 Dec 2016 Trojan

    Mobile Banking Trojan Now Encrypts Data for Ransom

    Mobile Banking Trojan

    An Android mobile banking Trojan, FakeToken, has been modified to be able to encrypt files...

    Read More
  • Thu, 22 Dec 2016 Malware

    Methbot Op Earns Millions Daily

    All
    Ad Fraud Operation

    Researchers have identified a Russian ad fraud operation dubbed Methbot...

    Read More
  • Wed, 21 Dec 2016 Ransomware

    Taxi System Hit By Ransomware

    Taxi system suffers ransomware attack

    Amey’s Taxi, a provider of taxi services in Canada, was recently hit by a ransomware attack...

    Read More
  • Wed, 21 Dec 2016 Ransomware

    Hailstorm Tactic Used to Send Spam Emails

    Spam

    Cyber criminals are using Hailstorm tactic to send large volumes of spam emails...

    Read More
  • Wed, 21 Dec 2016 Distributed Denial-of-Service (DDoS)

    State Websites Hit By DDoS Attacks

    DDoS

    Hackers affiliated to Citizens Against Single Gateway and Anonymous recently launched a series of Distributed Denial-of-Service (DDoS) attacks...

    Read More
  • Tue, 20 Dec 2016 Business Email Compromise (BEC)

    Irish County Council Confirms Attempted Cyber Fraud

    Phishing

    Ireland's Meath County Council has confirmed a cyber fraud attempt...

    Read More
  • Tue, 20 Dec 2016 Insider Threat

    Former Employees Charged for Data Theft

    Employees steal data

    An India-based IT company reported that two former employees had pilfered its customer database...

    Read More
  • Tue, 20 Dec 2016 Phishing

    Fake Retail Apps Steal Money and Personal Data

    fake retail apps

    There is a growing number of fake retail mobile applications aimed at pilfering victims' personal data and money. ..

    Read More
  • Mon, 19 Dec 2016 Trojan

    New Wide-Reaching Android Malware Variant

    All
    Android malware

    Tordow 2.0, the latest variant of the former Tordow Android banking Trojan, has now been upgraded with a wider range of functionalities...

    Read More
  • Mon, 19 Dec 2016 Hacking

    Hackers Deface Pakistan Government Website

    Hackers Deface Website

    Hacker group Pashtun Cyber Army recently defaced the official website of Pakistan's Khyber Pakhtunkhwa provincial government...

    Read More
  • Mon, 19 Dec 2016 Ransomware

    Minor Update to New Ransomware Variant

    All
    Ransomware

    The latest variant of the BandarChor ransomware is being distributed via malicious advertisements...

    Read More
  • Fri, 16 Dec 2016 Hacking, Personal Information

    UK KFC Suffers Data Breach

    All
    KFC

    The UK branch of popular fast food restaurant KFC recently suffered a data breach...

    Read More
  • Fri, 16 Dec 2016 Cyber Attacks

    Law Firms Prime Target for Cyber Attacks

    All
    Law firms

    The Law Council of Australia said that Australia’s law firms are a prime target for cyber attacks...

    Read More
  • Fri, 16 Dec 2016 Hacking, Personal Information

    Medical Internet Application Hacked, Users' Data Leaked

    Medical app hacked

    Quest Diagnostics, a US-based medical laboratory company, suffered a data breach...

    Read More
  • Fri, 16 Dec 2016 Cyber Security Guide

    Cyber Definition: Blended Threat

    All
    blended threat

    A blended threat is an exploit that integrates elements from different types of malware...

    Read More
  • Thu, 15 Dec 2016 Cyber Security Findings, Ransomware

    Spike of Ransomware Attacks in November

    All
    Spike in ransomware

    The number of ransomware attacks spiked in November 2016...

    Read More
  • Thu, 15 Dec 2016 Hacking

    SWIFT Confirms New Thefts and Hacking Tactics

    attacks on SWIFT

    Global financial messaging system SWIFT has been hit by a number of new cyber attacks...

    Read More
  • Thu, 15 Dec 2016 Personal Information

    Another 1 Billion Yahoo Accounts Revealed to be Breached in 2013

    All
    Yahoo

    Yahoo has disclosed another data breach in which more than one billion user accounts were compromised...

    Read More
  • Wed, 14 Dec 2016 Ransomware

    US$450,000 Lost to SamSa Ransomware

    ransomware

    Over the past year, cyber criminals behind the SamSa ransomware campaign...

    Read More
  • Wed, 14 Dec 2016 Hacking

    Japan Government Websites Under Attack

    Websites under attack

    Cyber attacks against targets in Japan, reportedly carried out by hacking collective Anonymous...

    Read More
  • Wed, 14 Dec 2016 Hacking, Personal Information

    Twitter Accounts Hacked, Personal Information Leaked

    All
    Twitter hacking

    A hacker group which calls itself 'Legion' was behind four high-profile Twitter account breaches...

    Read More
  • Tue, 13 Dec 2016 Cyber Security Findings

    Windows XP The Main Cause for Healthcare Cyber Attacks

    Healthcare

    The healthcare sector remains a primary target for cyber attacks because the majority...

    Read More
  • Tue, 13 Dec 2016 Trojan

    New Android Trojan Advertised for Rental

    All
    Android Trojan

    A new Android Trojan named Exo has been advertised for rental on forums and marketplaces...

    Read More
  • Tue, 13 Dec 2016 ATMs

    Indian ATM Fraudsters Arrested

    ATM skimming

    The Indian police recently arrested three individuals who installed debit and credit card skimmers...

    Read More
  • Mon, 12 Dec 2016 Cyber Security Solutions

    Solar Power Firm Issues Meters Patch

    Solar Power Firm

    US-based solar software and analytics firm Locus Energy has issued a patch for its LGate solar meters to address a vulnerability...

    Read More
  • Mon, 12 Dec 2016 Malware

    New Malware Infects PoS Terminals

    pos malware

    Researchers have discovered a new malware named Floki Bot that infects Point of Sale (PoS) terminals to steal credit card details...

    Read More
  • Mon, 12 Dec 2016 Business Email Compromise (BEC), Cyber Security Findings

    Global Email Scams Use Hong Kong Banks to Pilfer Money

    Business email compromise

    In 2016, international fraudsters used Hong Kong bank accounts to pilfer close to HK$1.5 billion...

    Read More
  • Fri, 9 Dec 2016 Cyber Security Guide

    Cyber Definition: Hot And Cold Site

    All
    Disaster Plan

    A hot site is a disaster recovery service that enables an organisation to continue computer and network operations...

    Read More
  • Fri, 9 Dec 2016 Phishing, Cyber Security Findings

    Phishing Sites May Last Only 15 Minutes

    All
    Phishing Mobile

    Statistics show that 84% of phishing sites observed in 2016 had an average life cycle of less than 15 hours...

    Read More
  • Fri, 9 Dec 2016 Ransomware, Cyber Security Findings

    Mobile Ransomware Increased By 140%

    All
    Mobile Secure

    Research has shown that the number of Android mobile ransomware has increased by 140%...

    Read More
  • Fri, 9 Dec 2016 Ransomware

    Why You Should Not Share The Popcorn Time

    All
    BitCoin

    Researchers have discovered a new ransomware named Popcorn Time that promises victims the decryption key...

    Read More
  • Thu, 8 Dec 2016 Vulnerability, Zero-Day Exploit

    Zero-Day Vulnerabilities Found In IP Cams

    All
    IP Cam

    Researchers found two zero-day vulnerabilities that affected more than 30 models of Internet Protocol (IP) cameras*...

    Read More
  • Thu, 8 Dec 2016 Ransomware

    New Ransomware Denies Victims Access To Hard Disk

    All
    Locked Hard Disk

    The Petya ransomware now has a new variant called GoldenEye, which is distributed via spam emails with macro-enabled document attachments...

    Read More
  • Thu, 8 Dec 2016 Malware

    New Redirection Attack Through Malicious Ads

    All
    Adware

    Since October, victims were redirected by malicious advertisements to a new exploit kit named Stegano, which exploits Adobe Flash vulnerabilities...

    Read More
  • Wed, 7 Dec 2016 Distributed Denial-of-Service (DDoS)

    New Botnet Launches Daily DDoS Attacks

    All
    Botnet

    Researchers have identified a new unnamed botnet that recently launched massive Distributed Denial-of-Service (DDoS)...

    Read More
  • Wed, 7 Dec 2016 Ransomware

    Kelihos Botnet Distributes New Ransomware Variant

    All
    Botnet

    The Kelihos botnet has recently distributed a new Shade ransomware variant...

    Read More
  • Wed, 7 Dec 2016 Phishing

    Unlimited Data Offer Is A Phishing Scam

    All
    Phishing

    A phishing scam is circulating among Indian mobile users via WhatsApp...

    Read More
  • Tue, 6 Dec 2016 Vulnerability

    New Vunerability Found In North Korean OS

    All
    Vulnerability

    Hackers have discovered a new vulnerability that enables remote client-side hacking in North Korea's Linux-based Red Star operating system (OS)...

    Read More
  • Tue, 6 Dec 2016 Distributed Denial-of-Service (DDoS)

    Russian Financial System Targeted By Foreign Hackers

    Finance

    The Russian Federal Security Service said that foreign hackers will conduct destabilising cyber attacks...

    Read More
  • Tue, 6 Dec 2016 Personal Information

    Indian Diagnostic Lab Leaks 35,000 Patient Records

    Health Data

    India-based diagnostic laboratory Health Solutions' website erased all of its online records after suffering a massive data leakage of more than 35,000 medical records...

    Read More
  • Mon, 5 Dec 2016 Ransomware

    Locky Expands Botnet To Inflict Greater Damage

    All
    Locky Ransomware

    The Locky ransomware is now adding victims into a botnet...

    Read More
  • Mon, 5 Dec 2016 Trojan

    Modified Mirai Disrupts Internet Access

    All
    Malware Internet Access

    An attack involving a modified Mirai malware was recently launched against UK Internet Service Providers (ISPs)...

    Read More
  • Mon, 5 Dec 2016 Phishing

    Internet Payment Phishing Hits Again

    Phishing

    Phishing sites using the 'csecurepay.com' domain impersonated 26 Indian banks to pilfer personal information from their customers...

    Read More
  • Fri, 2 Dec 2016 Cyber Security Guide

    Cyber Definition: Clean Desk Policy

    All
    Clean Office

    A clean desk policy (CDP) is a company directive on how employees should leave their work stations after hours...

    Read More
  • Fri, 2 Dec 2016 Virus

    Shamoon Virus Returns After Four Years

    Virus Alert

    The Shamoon virus has made a comeback after a four-year hiatus to attack computers in the government and transportation sectors in Saudi Arabia...

    Read More
  • Fri, 2 Dec 2016 Malware

    Gooligan Breaches Over 1 Million Google Accounts In Asia And Europe

    All
    Malware

    The Gooligan malware has infected Android devices and compromised more than one million Google accounts in Asia and Europe...

    Read More
  • Fri, 2 Dec 2016 Ransomware

    New Ransomware Deployed In Tech Support Scam

    All
    Encrypted

    A new ransomware named VindowsLocker is deployed in a tech support scam in which cyber criminals impersonate Microsoft technicians...

    Read More
  • Thu, 1 Dec 2016 Personal Information

    UK Pub Chain's Employees Bank Details Leaked

    Card Details

    Greene King, the UK's largest pub retailer and brewer, unintentionally leaked its employees' personal bank details...

    Read More
  • Thu, 1 Dec 2016 Cyber Security Findings

    Chinese Firms See 900% Increase In Cyber Incidents

    All
    Office

    According to a recent survey, Chinese firms have seen more than 900% increase in cyber security incidents since 2014...

    Read More
  • Thu, 1 Dec 2016 Hacking

    Israeli TV Hijacked By Hackers

    Hacker

    Two Israeli television news programmes were temporarily hijacked by unknown hackers on Tuesday to display religious images and messages...

    Read More
  • Wed, 30 Nov 2016 Ransomware

    Kangaroo Ransomware Locks You Out Of Windows

    All
    Encrypted

    Kangaroo ransomware, a variant of the Apocalypse ransomware, displays its legal notice lookalike ransom note before victims log in to their computers...

    Read More
  • Wed, 30 Nov 2016 Malware

    Mirai Malware Causes German Telco Broadband Outage

    Mirai German

    On 27 and 28 November 2016, unknown attackers attempted to infect German telecom Deutsche Telekom's broadband routers with Mirai malware...

    Read More
  • Wed, 30 Nov 2016 Hacking

    Japanese Government Denies Being Hacked

    Hacked

    The Japanese government has denied reports of the Ground Self-Defence Forces (GSDF)'s internal network being hacked in September...

    Read More
  • Tue, 29 Nov 2016 Malware

    Malware Distributed Through OneDrive

    All
    Business in Danger

    Cyber criminals are using Microsoft's OneDrive for Business accounts to distribute malware to companies in Australia and the United Kingdom...

    Read More
  • Tue, 29 Nov 2016 Ransomware

    Cyber Crooks Demand Over S$100k From San Francisco Transport Agency

    Mitigation Discussion

    The San Francisco Municipal Transport Agency (MTA) was recently hit by a variant of the Mamba/HDDCryptor ransomware...

    Read More
  • Tue, 29 Nov 2016 Hacking

    Alleged Hack On Japan's Defence Ministry

    Mitigation Discussion

    Japan's Ministry of Defence and Ground Self-Defence Forces (GSDF) were reportedly hacked this September...

    Read More
  • Mon, 28 Nov 2016 Social Media

    Images On Facebook And LinkedIn Spread Malware

    All
    Social Media

    Researchers have discovered a new attack vector, named ImageGate, which embeds malware in image and graphic files...

    Read More
  • Mon, 28 Nov 2016 Virus , Cyber Security Findings

    Telecom Fiji Receives More Than 1,000 Virus Attacks Each Day

    Bomb Cyber

    Telecom Fiji, one of the largest communications service provider in Fiji, receives more than 1,000 virus attacks each day...

    Read More
  • Mon, 28 Nov 2016 Personal Information

    Shad0wS3C Hacks Mexico Agency, Releases Sensitive Info

    Database

    Hacker group Shad0wS3C hacked the database of the Institute of the Registral Function of Mexico (FREM)...

    Read More
  • Fri, 25 Nov 2016 Malware

    MailChimp's Australian Customers Hit By Malware

    All
    Australian Clients

    The subscriber database of MailChimp, an online email marketing provider, was hacked and used to distribute malwares to clients...

    Read More
  • Fri, 25 Nov 2016 Government, Finance

    Asian And African Institutions Hit By InPage Zero-Day Exploit

    Zero-Day Exploit

    Government and financial institutions in Myanmar, Sri Lanka, and Uganda have been hit by spear phishing emails...

    Read More
  • Fri, 25 Nov 2016 Malware

    Headphones To Microphones: A New Way To Eavesdrop

    All
    Headphone Guy

    Malware can turn computers into eavesdropping devices by transforming headphones into microphones...

    Read More
  • Fri, 25 Nov 2016 Cyber Security Guide

    Cyber Definition: TDL-4

    All
    Alert Malware

    TDL-4, a fourth generation of the TDL malware, typically infects a computer using drive-by download on a compromised website...

    Read More
  • Thu, 24 Nov 2016 Distributed Denial-of-Service (DDoS)

    DDoS A Smokescreen For Other Attacks

    All
    Employee

    A recent study shows that Distributed Denial-of-Service (DDoS) attacks are sometimes deployed as a smokescreen...

    Read More
  • Thu, 24 Nov 2016 Cyber Security Solutions

    New TeleCrypt Ransomware Now Decrypted

    All
    Decrypted

    Security researchers have released a decryption key for TeleCrypt, a new ransomware that targets Telegram users...

    Read More
  • Thu, 24 Nov 2016 Hacking

    UK Deliveroo Accounts Hacked

    All
    Password Hacks

    Food delivery application Deliveroo UK user accounts were hacked and users were billed for food they did not order...

    Read More
  • Wed, 23 Nov 2016 Cyber Attacks

    UK Businessman Hired Hackers To Attack Websites

    All
    Corporate Hacks

    A UK payday loan businessman was charged for hiring hackers to sabotage a UK consumer watchdog website to remove complaints about his firm...

    Read More
  • Wed, 23 Nov 2016 Trojan

    Gatak Trojan Hits Healthcare Organisations

    Data Hospital

    Research has shown that healthcare organisations are most susceptible to the Gatak Trojan...

    Read More
  • Wed, 23 Nov 2016 Trojan

    Trojan Whitelists Itself To Stay Alive

    All
    Online Banking Mobile

    New variant of the FakeBank Android banking Trojan now displays...

    Read More
  • Tue, 22 Nov 2016 Ransomware

    RIG-E Exploit Kit Distributes New Ransomware

    All
    Chip

    The RIG-E exploit kit has started distributing a new ransomware called CHIP...

    Read More
  • Tue, 22 Nov 2016 Hacking

    US Irrigation District System Hacked And Data Held Ransom

    Hacker Anon

    In early November, hackers broke into the computer system of the Central Platte Natural Resources District (CPNRD)...

    Read More
  • Tue, 22 Nov 2016 Hacking

    Hackers Deface Bicol University Website

    Classroom

    Hackers recently defaced the website of the Bicol University (BU), Philippines...

    Read More
  • Mon, 21 Nov 2016 Hacking

    Poison Tap Hacks Password-Protected Computers

    All
    Poison Tap

    A white hat security researcher has developed a device named Poison Tap, which can hack a password-protected computer...

    Read More
  • Mon, 21 Nov 2016 Hacking

    Canadian Army Recruitment Site Hacked, Users Redirected to Chinese Page

    Website hack

    On 17 November 2016, the Canadian armed forces recruitment website was hacked...

    Read More
  • Mon, 21 Nov 2016 Insider Threat

    Six Million Customer Accounts At Risk After Hack on UK Telecom

    Data breach

    Six million customer accounts are at risk after hackers recently obtained access to the customer upgrade database...

    Read More
  • Fri, 18 Nov 2016 Personal Information

    Hackers Can Decode Passwords by Analysing Finger Movements

    Mobile security

    Hackers can now get users’ private information and passwords by reading finger movements...

    Read More
  • Fri, 18 Nov 2016 Ransomware

    New WinPlock Ransomware Uses Fax Messages to Infect Your PC

    All
    Ransomware via fax

    A new threat in the form of fax messages can infect your PC with ransomware...

    Read More
  • Fri, 18 Nov 2016 Distributed Denial-of-Service (DDoS)

    Critical Infrastructures at Risk of DDoS Attacks

    Critical Infrastructure

    A massive Distributed Denial-of-Service (DDoS) attack on Dyn in October, powered by a botnet of Internet of Things (IoT) devices...

    Read More
  • Fri, 18 Nov 2016 Cyber Security Guide

    Cyber Definition: Point-of-Sale Malware

    PoS

    Point-of-Sale (PoS) malware is a type of malicious software designed to steal customer payment data...

    Read More
  • Thu, 17 Nov 2016 Cyber Security Guide

    Cyber Criminals Gear Up For Holiday Season

    Cash from CPU

    As the holiday season approaches, financial institutions, retailers and customers have to be on guard...

    Read More
  • Thu, 17 Nov 2016 Trojan

    Secret Backdoor In Phones Collects And Sends User Data

    All
    Android Phone

    Security researchers have found a backdoor Trojan in the firmware of many low-end budget prepaid Android phones sold in the US...

    Read More
  • Thu, 17 Nov 2016 Ransomware

    New Ransomware Variant Threatens Users With Lawsuits

    All
    Social Media Risk

    Researchers have discovered a new ransomware variant named Ransoc. Unlike most ransomware...

    Read More
  • Wed, 16 Nov 2016 Trojan

    More Than A Million Android Users Downloaded Trojan

    All
    Installing App

    More than a million users have downloaded a malware disguised as apps on app stores, such as Google Play...

    Read More
  • Wed, 16 Nov 2016 Phishing

    Black Friday Sale Alert: Don't Be Tricked By Fake Amazon Emails

    Online Shopping

    UK's official online safety group Action Fraud has warned consumers to stay vigilant online in the wake of phishing emails purporting to be from Amazon...

    Read More
  • Wed, 16 Nov 2016 Ransomware

    Karma Ransomware Masquerades As Windows Optimisation Tool

    All
    Karma Ransomware

    A security researcher has discovered Karma, a file-encrypting ransomware that masquerades as a Windows optimisation programme called "Windows-TuneUp"...

    Read More
  • Tue, 15 Nov 2016 Cyber Security Findings

    One Laptop Can Bring Down Big Servers Via BlackNurse DoS Attack

    All
    One Laptop

    Researchers warn that a type of Denial-of-Service (DoS) attack, dubbed "BlackNurse", can be launched via a single laptop to attack firewalls...

    Read More
  • Tue, 15 Nov 2016 Phishing

    APT Group Launches Spear Phishing Before Zero-days Get Patched

    World in danger

    A Russian Advanced Persistent Threat (APT) group known as Pawn Storm, APT28, or Fancy Bear...

    Read More
  • Tue, 15 Nov 2016 Vulnerability

    Australian Cyber Head Warns Of E-Voting Risks

    Hacking

    Australia's ambassador for cyber affairs Dr Tobias Feakin cautioned that the vulnerability of government data and the potential weaponisation...

    Read More
  • Mon, 14 Nov 2016 Phishing

    Russian Hacker Group Launches Spear Phishing Campaign After Trump's Election Victory

    Spear Phishing

    Russia-based hacker group "the Dukes" launched a new spear phishing campaign after Donald Trump...

    Read More
  • Mon, 14 Nov 2016 Phishing

    Fake Parking Ticket Emails Loaded With Malware

    All
    Fake Email

    Fraudsters are sending out "Parking Charge Reminder" emails, quoting a charge of £90 for parking in a UK Parking Control LTD (UKPC) carpark...

    Read More
  • Mon, 14 Nov 2016 ATMs

    Two Romanians Jailed For Stealing $75,000 From UOB ATMs

    Money Pocket

    Two Romanians were sentenced to jail for abetting in a conspiracy to steal $75,000 from UOB ATMs using cloned cards...

    Read More
  • Fri, 11 Nov 2016 Cyber Security Guide

    Cyber Definition: Lightweight Directory Access Protocol

    All
    LDAP Injection

    Lightweight Directory Access Protocol (LDAP) is an open-standard protocol for querying and manipulating directory services...

    Read More
  • Fri, 11 Nov 2016 Phishing

    Phishing Emails Spread Locky Ransomware

    All
    Phishing Emails

    An ongoing phishing campaign targeting Americans is spreading the Locky ransomware...

    Read More
  • Fri, 11 Nov 2016 Ransomware

    Ransomware Uses Telegram To Communicate With The Attacker

    All
    Telegram

    Telecrypt, which is a new variant of the Trojan-Ransom.Win32 ransomware, uses instant messaging service Telegram's API...

    Read More
  • Fri, 11 Nov 2016 Distributed Denial-of-Service (DDoS)

    Five Major Russian Banks Repel Massive DDoS Attack

    Bubble Protect

    The Russian Central Bank revealed that at least five major Russian banks experienced Distributed Denial-of-Service (DDoS) attacks on their online banking...

    Read More
  • Thu, 10 Nov 2016 Phishing

    North Korean Hackers Use Political Scandal To Spread Trojans

    NK Hackers

    North Korea is capitalising on South Korean President Park Geun-hye's political scandal to spread malware...

    Read More
  • Thu, 10 Nov 2016 Distributed Denial-of-Service (DDoS)

    New IoT Botnet Infects 3,500 Devices In Five Days

    All
    IoT

    A new Internet of Things (IoT) botnet known as Linux/IRCTelnet botnet has infected 3,500 devices in five days...

    Read More
  • Thu, 10 Nov 2016 Trojan

    New TrickBot Trojan Able To Manipulate Browsers

    All
    Intruded

    The TrickBot Trojan that was discovered in September has evolved to include new attack techniques...

    Read More
  • Wed, 9 Nov 2016 Hacking , Personal Information

    Indian Embassies Hacked, Data Leaked Online

    Hacker

    Two Dutch hackers breached seven Indian Embassy websites using SQL injection (SQLi) to exploit vulnerabilities in the web application...

    Read More
  • Wed, 9 Nov 2016 Malware

    Malware Automatically Downloads Onto Android Devices

    All
    Android

    In August 2016, it was discovered that more than 300,000 Android devices were infected with the Svpeng banking Trojan after visiting...

    Read More
  • Wed, 9 Nov 2016 Phishing

    Phishing Campaign Targets LinkedIn Users

    All
    Phishing

    Cyber criminals are targeting Linkedln users with a phishing scam that tricks the users into providing personal details to resolve a "security issue"...

    Read More
  • Tue, 8 Nov 2016 Business Email Compromise (BEC)

    Hackers Target Thai Businesses With Email Scams

    All
    Companies

    Thailand Department of Special Investigation (DSI) reported that more Thai companies were victims of Business Email Compromise (BEC) scams...

    Read More
  • Tue, 8 Nov 2016 Vulnerability

    OAuth2.0 Hack Can Expose Over 1 Billion Android Accounts

    All
    Apps

    Mobile applications that support OAuth2.0 single sign-in service are vulnerable to a hacking technique that grants attackers...

    Read More
  • Tue, 8 Nov 2016 Vulnerability

    Industrial PLC Vulnerable To Stealthy Attacks

    Hacked

    Security researchers have discovered a way to hack Programmable Logic Controllers (PLCs) without being detected...

    Read More
  • Mon, 7 Nov 2016 Distributed Denial-of-Service (DDoS)

    Mirai Botnet Knocks Out Liberia's Internet

    Bot

    A Mirai botnet known as Botnet 14 launched several Distributed Denial-of-Service (DDoS) attacks...

    Read More
  • Mon, 7 Nov 2016 Cyber Security Findings

    Cyber Attacks Could Cost Australia US$16 Billion

    OWA

    In the latest Lloyd's City Risk Index 2015-2025, it was estimated that the Australia economy could lose US$16 billion due to cyber attacks...

    Read More
  • Mon, 7 Nov 2016 Vulnerability

    Outlook Web Access 2FA Can Be Bypassed

    All
    OWA

    A security analyst has discovered a way to bypass the Two-Factor Authentication (2FA) implemented on Microsoft Outlook Web Access (OWA)...

    Read More
  • Fri, 4 Nov 2016 Cyber Security Findings

    Only 1 in 20 Singapore Firms Discloses Cyber Risks

    All
    Cyber Meeting

    A recent study shows that only one in 20 Singapore firms discloses cyber risks...

    Read More
  • Fri, 4 Nov 2016 Distributed Denial-of-Service (DDoS)

    DDoS Attacks Bring Down William Hill Website

    Mirai DDoS

    UK bookmaker William Hill was recently hit by a series of Distributed Denial-of-Service (DDoS) attacks that took down its website...

    Read More
  • Fri, 4 Nov 2016 Trojan

    Banking Trojan Masquerades As Flash Player App

    Hacking For Money

    Researchers have discovered a new Android banking Trojan that masquerades as a Flash Player application...

    Read More
  • Fri, 4 Nov 2016 Cyber Security Guide

    Cyber Definition: Engine

    All
    Programming

    In programming, an engine performs an essential function for other programmes like operating systems or application programmes...

    Read More
  • Thu, 3 Nov 2016 Trojan

    Fake Conference Invites Deliver Trojans

    All
    APT Member

    The Lotus Blossom Advanced Persistent Threat (APT) group planted a variant of the Emissary Trojan in spear phishing emails...

    Read More
  • Thu, 3 Nov 2016 Vulnerability

    US Airspace Monitoring Network At Risk Of Hacking

    Airplane

    A US Department of Transportation (DOT) report released in October indicated that computers monitoring the US airspace system...

    Read More
  • Thu, 3 Nov 2016 Vulnerability

    WordPress Login Bypass Trick Found

    All
    EasyHack

    Researchers recently found a malicious login bypass code injected into a WordPress login PHP file...

    Read More
  • Wed, 2 Nov 2016 Distributed Denial-of-Service (DDoS)

    Annual Melbourne Horse Race At Risk Of DDoS Attacks

    DDoS

    Researchers have cautioned Australian betting agencies of potential Distributed Denial-of-Service (DDoS) attacks during the Melbourne Cup...

    Read More
  • Wed, 2 Nov 2016 Virus

    Virus Shuts Down UK Hospitals' Computer Network

    Virus Alert

    Operations at the Diana Princess of Wales Hospital and the United Lincolnshire Hospitals Trust (ULHT) were recently cancelled after a virus infected...

    Read More
  • Wed, 2 Nov 2016 Domain Shadowing

    Sundown Remains Active In Exploit Kit Landscape

    All
    Blacklist Avoider

    In the past six months, the Sundown exploit kit remains active while major exploit kits like Nuclear, Angler...

    Read More
  • Tue, 1 Nov 2016 Malware

    Dropper Malware Uses PasteBin To Download Trojan

    All
    Email Malware

    Researchers have discovered a dropper malware that masquerades as a legitimate VMWare virtualisation software...

    Read More
  • Tue, 1 Nov 2016 Malware

    New Malware Family Targets Linux-Based IoT Devices

    All
    IoT

    A new malware family named IRCTelnet has been found to target Linux-based Internet of Things (IoT) devices to add them to a botnet...

    Read More
  • Tue, 1 Nov 2016 Malware

    Mirai Malware's DDoS Attacks Can Be Stopped

    All
    MiraiBot

    Researchers found a buffer overflow vulnerability in the Mirai malware source code...

    Read More
  • Mon, 31 Oct 2016 Personal Information

    Australian Red Cross Blood Service Data Breached

    Data Breach

    The Australian Red Cross Blood Service recently suffered a data breach after an unauthorised person accessed a file containing blood donor information...

    Read More
  • Mon, 31 Oct 2016 Advanced Persistent Threat (APT)

    Blackgear APT Group Now Targets Japan

    All
    Target

    The Blackgear Advanced Persistent Threat (APT) group has turned its focus from Taiwanese to Japanese targets in its recent three-stage infection...

    Read More
  • Mon, 31 Oct 2016 Ransomware

    New Ransomware Holds Victims Hostage To Complete Surveys

    All
    Ransomlock

    A new ransomware has been found to hold victims hostage by locking their computers until they complete surveys hosted on the FileIce survey platform...

    Read More
  • Fri, 28 Oct 2016 Supervisory Control and Data Acquisition (SCADA)

    Major Vulnerability In Schneider Electric's Flagship Software

    ICS Skull

    Researchers recently discovered a major vulnerability in Schneider Electric's flagship industrial controller management software Unity Pro...

    Read More
  • Fri, 28 Oct 2016 Social Media

    UK Banking Users Tricked By Twitter Phishing Scam

    Phishing

    UK banking users are recently targeted in a Twitter phishing scam...

    Read More
  • Fri, 28 Oct 2016 Vulnerability

    Critical Infrastructure Providers Send Unencrypted Pager Messages

    Private Data

    A recent study shows that a large number of critical infrastructure providers rely on unsecured wireless pagers to deliver sensitive information and important alerts like nuclear contamination...

    Read More
  • Fri, 28 Oct 2016 Cyber Security Guide

    Cyber Definition: ClickJacking

    All
    ClickJack

    Clickjacking is when a user clicks on a seemingly legitimate button which has an embedded malicious code...

    Read More
  • Thu, 27 Oct 2016 Ransomware

    New Dropper Malware Uses MigWiz To Execute Ransomware

    All
    Spam Email

    A new unnamed dropper malware has been found to bypass the User Account Control (UAC) screen by using MigWiz, a Microsoft programme...

    Read More
  • Thu, 27 Oct 2016 Phishing

    Moonlight Hackers Deliver H-Worm Trojan Using Phishing Scams

    Hacker

    A group of hackers known as Moonlight has been carrying out cyber espionage campaigns in the Middle East by sending malware-laden phishing emails...

    Read More
  • Thu, 27 Oct 2016 Distributed Denial-of-Service (DDoS)

    Subscribers' Devices Used In DDoS Attacks On StarHub

    Hacker

    The devices of Singapore telecom operator StarHub's subscribers were used to carry out the recent Distributed Denial-of-Service (DDoS) attacks on its Domain...

    Read More
  • Wed, 26 Oct 2016 Distributed Denial-of-Service (DDoS)

    StarHub BroadBand Service Outages Caused By DDoS Attacks

    DDoS

    Singapore telecom operator StarHub has confirmed that recent broadband service outages were caused by Distributed Denial-of-Service (DDoS) attacks...

    Read More
  • Wed, 26 Oct 2016 Trojan

    Kovter Backdoor Trojan Modifies Distribution And Infection Tactics

    All
    Trojan

    The Kovter backdoor Trojan is now distributed via targeted phishing campaigns...

    Read More
  • Wed, 26 Oct 2016 Trojan Malware

    Android 6.0 Users Now At Risk From GM Bot Attacks

    All
    Android

    The GM Bot mobile banking malware has been updated to target Android 6.0 users...

    Read More
  • Tue, 25 Oct 2016 Vulnerability

    Ransomware Risks For UK Commuters In Trains With Public Wi-Fi

    Train

    UK train operators have set up public Wi-Fi on trains without adhering to basic cyber security guidelines...

    Read More
  • Tue, 25 Oct 2016 Ransomware

    Locky Ransomware Uses New Odin Extension

    All
    Ransomware

    The latest variant of the Locky ransomware has been detected with a new .odin extension for encrypted files...

    Read More
  • Tue, 25 Oct 2016 Hacking

    Hackers Steal Admin Credentials From Prestashop

    Stress Admin

    Attackers recently hacked into the server of e-commerce software provider PrestaShop and infected its PHP files with malware...

    Read More
  • Mon, 24 Oct 2016 Distributed Denial-of-Service (DDoS)

    DDoS Attacks Cripple Major US Websites

    All
    DDoS

    On 21 October, access to major US websites, including the New York Times, Twitter, Spotify, and Airbnb...

    Read More
  • Mon, 24 Oct 2016 Phishing

    Zycode Phishing Campaign Targeting Chinese Apple Users Resurfaces

    All
    Apples

    The Zycode phishing campaign targeting Chinese Apple users for their Apple credentials has reappeared after a brief hiatus...

    Read More
  • Mon, 24 Oct 2016 Trojan

    Discord VoIP Chat Service Used To Host RATs

    Chat

    Cyber criminals are using Discord, a free Voice over Internet Protocol (VoIP) service for the gaming community...

    Read More
  • Fri, 21 Oct 2016 Online Scams

    5th Global Airport Action Day Uncovers Air Ticket Fraud

    Airplane

    In a global operation dubbed the 5th Global Airport Action Day, 193 individuals suspected of travelling with air tickets purchased using pilfered...

    Read More
  • Fri, 21 Oct 2016 Ransomware

    Indonesian Hacker Installs PHP Ransomware On Defaced Websites

    All
    Hacker

    An Indonesian hacker affiliated to a hacking group named Indonesia Defacer Tersakiti installed PHP-based JapanLocker...

    Read More
  • Fri, 21 Oct 2016 Malware

    New Spambot Improves Delivery Efficiency Of Spam Emails

    All
    Spambot

    The new spambot from the malware family of Sarvdap has improved its delivery efficiency by exploiting reputation blacklist service APIs...

    Read More
  • Fri, 21 Oct 2016 Cyber Security Guide

    Cyber Definition: Botnet Sinkhole

    All
    Botnet

    A botnet sinkhole is a target machine that researchers use to obtain information regarding a particular botnet...

    Read More
  • Thu, 20 Oct 2016 Ransomware

    London A Hotbed For Ransomware Attacks

    London City

    The City of London in the United Kingdom has become a hotbed for ransomware attacks...

    Read More
  • Thu, 20 Oct 2016 Ransomware

    Password-Protected Attachment Delivers Cerber Ransomware

    All
    Binary Password

    The latest variant of macro-enabled malware delivers Cerber ransomware through password-protected Word documents attached in phishing emails...

    Read More
  • Thu, 20 Oct 2016 Personal Information

    Pilfered Credit Card Numbers Hidden In Image Files

    CreditCard Pilfering

    Cyber criminals are hiding pilfered credit card details in image files on sites that run the open source e-commerce software Magento...

    Read More
  • Wed, 19 Oct 2016 Trojan

    Singapore And Hong Kong Android Users Hit By Acecard Banking Trojan

    Trojan

    The latest version of the Acecard banking Trojan has been targeting Android users in Singapore and Hong Kong...

    Read More
  • Wed, 19 Oct 2016 Personal Information

    Nuclear Research Data Pilfered From Japanese University

    Data

    Hackers pilfered nuclear research data and personal information of researchers from the University of Toyama's Hydrogen Isotope Research Centre...

    Read More
  • Wed, 19 Oct 2016 Ransomware

    Indian Chartered Accountants Increasingly Hit By Ransomware

    Spear Phishing Email

    Every month, almost 20 chartered accountants fall prey to cyber attacks, which increasingly are linked to ransomware, as shown from Indian police statistics...

    Read More
  • Tue, 18 Oct 2016 Trojan

    Ghost Push Trojan Keeps Going After Two Years

    All
    Trojan

    The Ghost Push Trojan remains the deadliest Trojan infection, two years after it first surfaced...

    Read More
  • Tue, 18 Oct 2016 Hacking

    Construction Sign Hacked To Criticise Chicago Mayor

    Hacker

    A construction sign in Chicago, United States was recently hacked to display a message criticising the Mayor...

    Read More
  • Tue, 18 Oct 2016 Trojan

    New TrickBot Banking Trojan Could Be Upgraded Version Of Dyre Trojan

    Trojan

    The new TrickBot banking Trojan could be an upgraded version of the Dyre banking Trojan, which was one of the most prominent fraud tools...

    Read More
  • Fri, 14 Oct 2016 Cyber Security Guide

    Cyber Definition: Blowfish

    All
    Blowfish

    Blowfish is a free symmetric encryption algorithm that uses a secret key to encrypt and decrypt data...

    Read More
  • Fri, 14 Oct 2016 Ransomware

    First Ransomware Written In Google's Go Language Decrypted

    All
    Encrypted

    The first ransomware variant written in Google's Go programming language turned into a fiasco after researchers...

    Read More
  • Fri, 14 Oct 2016 Malware

    Fashion Retailer Vera Bradley Suffers PoS Malware Attack

    Hacker

    On 13 October 2016, US fashion retailer Vera Bradley announced that its data was breached after its point-of-sale (PoS)...

    Read More
  • Fri, 14 Oct 2016 Phishing

    Hacker Pilfers Bitcoins Using Dark Web Phishing Sites

    All
    Bitcoins

    A US-based hacker was arrested for phishing for login credentials to the deep web and stealing bitcoins...

    Read More
  • Thu, 13 Oct 2016 Hacking

    Gamer Accounts Hacked For Game Currencies

    Minecraft

    Research has shown that cyber criminals are hacking gamer accounts and gaming companies to pilfer game currencies...

    Read More
  • Thu, 13 Oct 2016 Trojan

    Financial Institutions Attacked By New Trojan Odinaff

    Cyber Finance

    Since January 2016, a new banking Trojan called Odinaff has been used specifically in cyber attacks against financial institutions...

    Read More
  • Thu, 13 Oct 2016 Malware

    Foreign State Behind Malware Attack On Australia's Bureau Of Meteorology

    Cyber Security

    On 12 October 2016, the Australian Cyber Security Centre (ACSC) disclosed that the malware attack on Australia's Bureau of Meteorology (BoM)...

    Read More
  • Wed, 12 Oct 2016 Cyber-Terrorism

    Cyber Terrorism Against Nuclear Plants A Real Threat, Says IAEA

    Missile Activated

    The International Atomic Energy Agency (IAEA) recently warned that cyber terrorism against nuclear plants is now a real...

    Read More
  • Wed, 12 Oct 2016 Ransomware

    DXXD Ransom Note Displayed Using Windows Legal Notice

    All
    Files Encrypted

    A new ransomware dubbed DXXD is the first ransomware to display its ransom note using the Windows Legal Notice...

    Read More
  • Wed, 12 Oct 2016 Advanced Persistent Threat (APT)

    WinRAR And TrueCrypt Websites Suffer Watering Hole Attacks

    All
    Inject Malware

    StrongPity, an advanced persistent threat (APT) group, launched attacks targeting users of WinRAR and TrueCrypt websites using watering hole technique...

    Read More
  • Tue, 11 Oct 2016 Social Media Malware

    Eko Malware Spreads Via Facebook Messenger

    All
    Social Media

    The French Interior Ministry recently issued a formal warning after numerous Facebook users in France fell victim to Eko malware...

    Read More
  • Tue, 11 Oct 2016 Cyber Security Findings

    Australian's Retirement Savings Targeted In Cyber Attacks

    Bank Account

    Australia's superannuation industry suffered the most cyber attacks in the financial sector...

    Read More
  • Tue, 11 Oct 2016 Ransomware

    63% Of British Universities Suffered Ransomware Attacks

    Classroom University

    Research has shown that 63% of British universities have experienced ransomware attacks...

    Read More
  • Mon, 10 Oct 2016 Hacking

    Two Teenagers Arrested For Alleged Cyber-Attack-For-Hire Operations

    All
    Hacker

    The US Department of Justice has arrested two teenagers for their alleged connections to hacking groups Lizard Squad and PoodleCorp...

    Read More
  • Mon, 10 Oct 2016 Vulnerability

    Vulnerable Thermostats Could Shut Down Power Stations

    Energy Grid

    Research has shown that attackers could use Internet-connected thermostats to launch cyber attacks against power stations...

    Read More
  • Mon, 10 Oct 2016 Personal Information

    Over 100 E-commerce Sites Infected With Keylogger

    Ecommerce

    A study shows that more than 100 e-commerce websites worldwide have been infected with web-based keyloggers that are being used to steal credit card data keyed into online checkout forms...

    Read More
  • Fri, 7 Oct 2016 Hacking

    Hacking Forum Gets Hacked, Exploit Kits And Database Leaked

    All
    Hacker

    A group of hackers known as Peace_of_Mind has hacked a website belonging to w0rm.ws, resulting in a data leak...

    Read More
  • Fri, 7 Oct 2016 Hacking

    OurMine Hacks And Defaces BuzzFeed Website

    All
    BuzzFeed

    On Wednesday, hacking group OurMine breached BuzzFeed, a cross-platform global network for news and entertainment...

    Read More
  • Fri, 7 Oct 2016 Ransomware

    Cerber Ransomware Kills Database Processes To Access Important Data

    All
    Pharming

    A new version of Cerber ransomware kills database processes, enabling the ransomware to encrypt more files...

    Read More
  • Fri, 7 Oct 2016 Cyber Security Guide

    Cyber Definition: Drive-By Pharming

    All
    Pharming

    Drive-by pharming is a vulnerability exploit in which the attacker takes advantage of an inadequately protected broadband router to gain access to user data...

    Read More
  • Thu, 6 Oct 2016 Distributed Denial-of-Service (DDoS)

    Relentless DDoS Attacks Raise Alarm For Organisations

    All
    DDoS

    A study released this week revealed that the volume of Distributed Denial-of-Service (DDoS) attacks has remained consistently high and these attacks are causing damage to organisations globally...

    Read More
  • Thu, 6 Oct 2016 Vulnerability

    Insulin Pump Vulnerabilities Can Lead To Overdose

    Insulin Pump

    An insulin pump manufactured by a Johnson & Johnson subsidiary is found with several vulnerabilities that can be exploited by remote hackers to trigger an insulin overdose...

    Read More
  • Thu, 6 Oct 2016 Ransomware

    Upgraded Lockscreen Ransomware Ups Difficulty Of Password Recovery

    All
    Android Passcode

    Cyber criminals have upgraded the Android Lockscreen ransomware to make it more difficult for researchers to crack the lockscreen passcode...

    Read More
  • Wed, 5 Oct 2016 Personal Information

    D0xware Threatens To Release Victims' Personal Data Online

    All
    Hacked

    If your computer is infected with the updated version of Jigsaw ransomware...

    Read More
  • Wed, 5 Oct 2016 Phishing

    Real-Time Phishing Emerges In Brazil

    Phishing

    A real-time phishing campaign has recently emerged in Brazil...

    Read More
  • Wed, 5 Oct 2016 Cyber Security Findings

    Cyber Threats, Data Privacy Breaches Top Concerns For Transportation Industry

    Airplane Controls

    In a study published last month, executives in the transportation industry are most concerned with cyber threats and data privacy breaches affecting their operations...

    Read More
  • Tue, 4 Oct 2016 Ransomware

    USA Police Department Suffers Ransomware Attack

    Police

    The Mount Holly Springs Police Department in Pennsylvania, United States, recently suffered a ransomware attack...

    Read More
  • Tue, 4 Oct 2016 Ransomware

    Cloud Provider Pays S$24k In Ransomware Attack

    Ransomware

    London-based hosted desktop and cloud provider VESK was hit by a ransomware virus recently...

    Read More
  • Tue, 4 Oct 2016 Distributed Denial-of-Service (DDoS)

    Source Code Behind Mirai IoT Botnet Revealed

    All
    IoT

    The source code of the Mirai botnet has been publicly released...

    Read More
  • Mon, 3 Oct 2016 Cyber Security Guide

    Singapore: Cyber Crime Prevention Is Everyone's Responsibility

    Crime Scene

    The Monetary Authority of Singapore (MAS) has called on financial institutions and consumers to jointly prevent cyber crime...

    Read More
  • Mon, 3 Oct 2016 Ransomware

    Princess Locker Demands 3 Bitcoins To Unlock Victim's Files

    All
    Princess Locker

    A new ransomware dubbed Princess Locker has recently been discovered...

    Read More
  • Mon, 3 Oct 2016 Hacking

    OHL Sells Microsoft Office 365 Admin Accounts On Dark Net

    All
    Microsoft Office

    In September, a new service called Open Hacking Lab (OHL) offered for sale 12 Microsoft Office 365 global administrator accounts on the dark net...

    Read More
  • Fri, 30 Sep 2016 Malware

    Confucius Malware Derives C&C Server Using Word Puzzles

    All
    Bits

    Two backdoor Trojan samples known as Confucius were found to retrieve the command-and-control (C&C) server's IP address using word puzzles...

    Read More
  • Fri, 30 Sep 2016 Ransomware

    TheDarkOverlord Steals And Extorts From Investment Bank

    TheDarkOverlord

    A hacker called TheDarkOverlord stole internal documents and extorted money from Los Angeles-based investment bank WestPark Capital...

    Read More
  • Fri, 30 Sep 2016 Personal Information

    Australian Health Department Leaks Medical Data

    Personal Info

    The medical data of Australians that was released online by Australia's Department of Health can be decoded, even when it has been de-identified...

    Read More
  • Fri, 30 Sep 2016 Cyber Security Solutions

    Cyber Definition: Spam Cocktail

    All
    No Spam

    A spam cocktail is the use of a combination of different technologies to identify and minimise spam...

    Read More
  • Thu, 29 Sep 2016 Ransomware

    Virlock Ransomware Spreads On Cloud

    All
    Ransoming

    The latest variant of the Virlock ransomware is being distributed stealthily in cloud storage and collaboration applications...

    Read More
  • Thu, 29 Sep 2016 Hacking

    China Loses S$20 Billion To Local Hackers Every Year

    Local Hackers

    China's criminal hacking community of 400,000 hackers is causing the country's economy to lose 100 billion yuan (approximately S$20 billion) each year...

    Read More
  • Thu, 29 Sep 2016 Ransomware

    North Korea May Launch Ransomware Attacks In October

    Korean Leader

    A cyber security expert cautioned that North Korea could launch a large-scale ransomware attack on South Korea as 10 October 2016 approaches...

    Read More
  • Wed, 28 Sep 2016 Trojan

    Russian Hackers Target Mac OS X Users With Komplex Trojan

    Mac OS X

    Fancy Bear, a group of Russian hackers, has been targeting Mac OS X users in the aerospace industry with the Komplex Trojan...

    Read More
  • Wed, 28 Sep 2016 Ransomware

    MarsJoke Ransomware Hits Government And Education Sectors

    School

    Government agencies and educational institutions in the United States have been under attack from a new ransomware called MarsJoke...

    Read More
  • Wed, 28 Sep 2016 Distributed Denial-of-Service (DDoS)

    Hosting Firm Suffers IoT Botnet Attacks

    All
    DDoS

    France-based hosting company OVH recently suffered from a series of Distributed Denial-of-Service (DDoS) attacks...

    Read More
  • Tue, 27 Sep 2016 Business Email Compromise (BEC)

    Rising BEC Scams In Malaysia

    All
    Online Scam

    In Malaysia, Business Email Compromise (BEC) scams are on the rise...

    Read More
  • Tue, 27 Sep 2016 Distributed Denial-of-Service (DDoS)

    IoT Devices Increasingly Used For DDoS Attacks

    All
    Botnet

    Recent research shows that Internet of Things (IoT) devices are increasingly used as botnets to carry out Distributed Denial-of-Service (DDoS) attacks...

    Read More
  • Tue, 27 Sep 2016 Malware

    Buhtrap Banking Malware Attacks Again

    Cyber Criminal

    Cyber criminal group Buhtrap has been launching malware attacks against Russian and Ukrainian banks...

    Read More
  • Mon, 26 Sep 2016 ATMs

    Fingerprint Skimmers: The Emerging Threat For ATMs

    Fingerprint

    At least 12 underground sellers have been recently found to be offering biometric skimmers capable of pilfering fingerprints...

    Read More
  • Mon, 26 Sep 2016 Insider Threat

    Key Internal Threats: Employee Access To Social Media And BYOD Culture

    All
    Social Media

    A recent survey has found that employee access to social media and bring your own device (BYOD) culture pose the greatest internal security threats to UK organisations...

    Read More
  • Mon, 26 Sep 2016 Virtual Machine

    Malware Evades Detection With Anti-VM Tricks

    All
    Anti-VM

    Security researchers have discovered a malware that can evade detection by lying dormant in a Virtual Machine (VM) environment...

    Read More
  • Fri, 23 Sep 2016 Distributed Denial-of-Service (DDoS)

    DDoS Attacks Disable Trading System In Taiwan

    DDoS

    Taiwanese investment firm First Securities suffered a series of Distributed Denial-of-Service (DDoS) attacks that temporarily disabled its trading system yesterday...

    Read More
  • Fri, 23 Sep 2016 Distributed Denial-of-Service (DDoS)

    #OpClosedMedia: Hacktivists Attack Media Agencies

    Media Agency

    Yesterday, hacker group Powerful Greek Army launched a month-long hacktivist campaign #OpClosedMedia...

    Read More
  • Fri, 23 Sep 2016 Trojan

    New Android Banking Trojan Roots Devices

    Android

    Security researchers have identified a new banking Trojan called Tordow...

    Read More
  • Fri, 23 Sep 2016 Cyber Security Guide

    Cyber Definition: Privilege Escalation Attack

    All
    Privilege Escalation

    In a privilege escalation attack, an attacker exploits design flaws or programming errors in an operating system to gain elevated access to a network and its applications...

    Read More
  • Thu, 22 Sep 2016 Ransomware

    Fake FedEx Emails Carry Ransomware

    All
    Fake Email

    Fraudulent FedEx emails that contain ransomware have been circulating on the Internet...

    Read More
  • Thu, 22 Sep 2016 Hacking

    Hacktivists Deface Four Italian Healthcare Websites

    Anonymous

    Anonymous Italia and AntiSec-Italia launched the #OpSafePharma hacktivist campaign again...

    Read More
  • Thu, 22 Sep 2016 Trojan

    Qadars Trojan Targets UK Bank Customers

    Online Transaction

    Banking users in the United Kingdom have been hit by the latest version of banking Trojan Qadars...

    Read More
  • Wed, 21 Sep 2016 ATMs

    90% Of Asian Organisations Suffered Cyber Attacks

    Asian Bank

    Asian organisations have become a prime target of cyber attacks in the recent years...

    Read More
  • Wed, 21 Sep 2016 Phishing

    iSpy Keylogger Upgrades To Version 3.X

    All
    iSpy Keylogger

    The iSpy keylogger has been updated to version 3.x, which can better evade detection...

    Read More
  • Wed, 21 Sep 2016 Ransomware

    DetoxCrypto Ransomware Disguises As Misspelled Security Software

    All
    Detoxcrypto

    A new variant of the DetoxCrypto ransomware has disguised itself as a security software from US-based security firm Malwarebytes...

    Read More
  • Tue, 20 Sep 2016 Cyber Security Findings

    Singapore: Expected Growth In Cyber Attacks Due To IT Talent Shortage

    All
    IT Security

    A survey has shown that 85% of Singaporean Chief Information Officers (CIOs) expect an increase in cyber security threats over the next five years...

    Read More
  • Tue, 20 Sep 2016 Distributed Denial-of-Service (DDoS)

    Poodlecorp Hits Gaming Firm Blizzard With DDoS Attack

    All
    Poodlecorp

    Hacking group, PoodleCorp, attacked the servers of video gaming firm Blizzard with Distributed Denial-of-Service (DDoS) on 18 September 2016...

    Read More
  • Tue, 20 Sep 2016 Ransomware

    Mamba Ransomware Locks You Out Of Your Computer

    All
    Mamba

    A new ransomware called Mamba can lock users out of their computers by overwriting the Master Boot Records (MBRs)...

    Read More
  • Mon, 19 Sep 2016 Ransomware

    Ransomware Continues To Infect Hospitals

    Hospital

    Security researchers warn that hospitals will continue to be at high risk of ransomware attacks...

    Read More
  • Fri, 1 Jul 2016 Cyber-terrorism

    Records Of Suspected Offenders Leaked

    Terrorists

    Chris Vickery, a security researcher, has reportedly leaked more than 2.2 million records of suspected criminals after an unnamed third party gained access...

    Read More
Load More
Show Less
Certis CISCO Terms of Use Privacy Policy © 2016 Quann
Back to top