As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify the process of getting warrants to hack into devices of US citizens and the citizens of other countries.
Microsoft researchers Itai Grady and Tal Be'ery released today a new tool designed to help system administrators protect enterprise networks from reconnaissance attacks.
Security researchers have discovered a new Android trojan that uses the DroidPlugin framework to split malicious behavior across multiple plugins, making detection much harder.
Reporters from a Dutch television station said today they've discovered files from Europol investigations into possible terrorist suspects on an unprotected hard drive connected to the Internet.
Android malware known as Gooligan has compromised and stolen login tokens from over one million Android devices, Check Point researchers announced today.
Mozilla engineers are working on a patch to fix a zero-day exploit that's currently being used to deanonymize Tor Browser users.
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and check the validity of stolen online accounts.
Multiple Windows computers at Carleton University have been infected with ransomware and caused downtime for many computer services. It is unknown what ransomware the computers are infected with, but a student has said that the ransomware devs demand 39 bitcoins to decrypt them all.
A report released today on the software products with the most security flaws in the past three months reveals that almost a quarter of all entries on the monthly Top 20 list were various types of security products.
Windows security expert and infrastructure trainer Sami Laiho has discovered a simple method of bypassing BitLocker during the Windows 10 update procedure.
The San Francisco Municipal Transportation Agency (SFMTA, also nicknamed Muni) has published a statement denying rumors that the hacker who infected their systems with ransomware might have stolen data from its servers.
PayPal engineers have removed a "magic word" that would have allowed an attacker to obtain OAuth secret tokens for -- any -- PayPal application and access customer details.
Malwarebytes and independent security researcher @TheWack0lian have released free decryptors for a new ransomware variant that appeared last week, which mimics a tech support scam and employs the Pastebin API to save decryption keys.
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand out a bit more is the use of a legal notice as a ransom note that is displayed to all victims before they login to their computer.
Prices have skyrocketed at Indian Bitcoin exchange platforms following the government decision to denominate the 500 and 1,000 Rupees currency notes with only a night's notice.
Hackers are blackmailing the customers of a Liechtenstein bank, asking victims to send 10% of their funds to a Bitcoin address or have their bank accounts details exposed online, to the press, or the financial authority in the customer's country.
For two days now, over 900,000 routers belonging to Deutsche Telekom users in Germany have been knocked offline following a supposed cyber-attack.
This online course bundles contains six courses that teach you how to program in C, C++, and C#. This bundle is normally priced at $1,800, but has been discounted 97% to $39. Even better for Cyber Monday you can use coupon code CYBER25 to get an additional 25% off of all development deals.
The network of the Japanese Defence Ministry was the target of a cyber-attack in September this year. According to an inside source who spoke with Kyodo News, the attack may have been the work of a state-sponsored group.