A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge to fry the device it is plugged into.
Researchers at security firm Proofpoint found 543 social media profiles related to Pokemon Go, with 167, or about 30%, being fraudulent. These profiles are being used to target users with adware, spyware, and malware.
The Dridex banking trojan might be involved in fewer attack campaigns, but its developers are still outfitting it with some new functionalities, including the ability to target crypto-currency wallets.
A mobile banking trojan called Trojan-Banker.AndroidOS.Gugi.c, or "Gugi" for short, found no problem bypassing a couple of the security measures introduced in Android 6.. Even worse, it does it through social engineering rather than exploiting vulnerabilities.
Researchers have found that approximately half of all users will click on links sent to them from unknown senders despite knowing the risks of phishing and a malware infection.
Researchers have created a piece of software that uses an unmodified USB device to leak data stored on an air-gapped computer over radio frequency (RF) signals.
Tech support scammers have devised a slew of new tricks with which they hope to trick unsuspecting Google Chrome users. Malwarebytes have uncovered a new technique that tech support scammers can use to make it look like the site you are visiting a legitimate one, rather than one under the scammers control.
Researchers have devised a system that can recognize a user's keystrokes by exploiting available WiFi signals. Using these attacks, under the right set of circumstances, hackers or other criminals could potentially monitor what you are typing purely on WiFi signals.
Hospitality chain Millennium Hotels & Resorts North America is warning customers that malware may have affected food and beverage point-of-sale (POS) systems at 14 of its locations. MHR first learned about a possible malware infection, which is believed to have occurred in early March 2016, from the United States Secret Service.
For the first time ever, researchers have detected an Android botnet leveraging a Twitter command-and-control (C&C) account to manage communications across all enslaved devices.
U.S. intelligence officials think hackers working for Russia perpetrated a series of alleged intrusions targeting reporters at The New York Times and other media outlets.
Germany and France feel the makers of encrypted messaging apps like Telegram and Signal should help fight Islamic State terrorists, and they're pushing for Europe-wide rules to make that happen.
Security researchers have demonstrated a system by which they can use publicly available photographs of an individual to trick facial recognition technology and achieve successful authentication.
On 17 August, open-source project Bitcoin.org announced on their website that the next version of Bitcoin Core, a popular digital wallet for the cryptocurrency, could be hacked and replaced with a malicious look-alike by state sponsored actors.
Members of a pornography website targeted dozens of Australian schools so they could view and swap graphic sexual images of female students and other non-consenting women. News.com reports that members of the site have posted and shared more than 2,000 images since December 2015.