Microsoft admitted last week that it incorrectly updated some Windows 10 users to the latest version of the Windows 10 operating system —version 1709— despite users having specifically paused update operations in their OS settings.
For a limited time, the Penetration Testing Essentials by Wiley is available for free. This eBook offers an easy to understand introduction to penetration testing so you can get started in a information security career.
Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in which attackers could use USB devices to compromise users' computers.
A cyber-espionage group historically believed to be operating in the interests of the Chinese government is believed to have hacked a UK government contractor from where security researchers found evidence that attackers stole information related to UK government departments and military technology.
A well-established research team from the Ben-Gurion University of the Negev in Israel has detailed today a new method of extracting data from air-gapped computers using speakers, headphones, earphones, or earbuds.
Today one of our volunteers, Aura, told me about a new new malspam campaign pretending to be from Craigslist that is under way and distributing the Sigma Ransomware. These spam emails contain password protected Word or RTF documents that download the Sigma Ransomware executable from a remote site and install it on a recipients comput
Whenever something newsworthy comes out there will always be people who try to take advantage of it. A perfect example of this is the Fortnite iOS mobile invite that launched today, where people are impatiently waiting for the invite codes to be released, while others try to trick them into purchasing fake ones.
Three in-browser cryptocurrency mining scripts ranked first, second, and fourth in Check Point's most active malware top ten, outranking classic high-output malware distribution infrastructures such as spam botnets, malvertising, and exploit kit operations.
Hacking tools leaked last year and believed to belong to the US National Security Agency (NSA) contain an utility for detecting the presence of malware developed by other cyber-espionage groups.
For those who have been anxiously awaiting Fortnite's iOS Mobile invite signup, it is now live! iOS users can now signup using a new account or by using their existing PC, Xbox, or Playstation accounts.
Starting with Firefox 60 —expected to be released in May 2018— websites won't be able to use Firefox to access data from sensors that provide proximity distances and ambient light information.
Today's deal is for a huge 9 course bundle that offers training on numerous Cisco certifications including the CCNA & CCNP Routing & Switching, Cisco SWITCH 300-115, CICD, other exams. This bundle is normally priced at $59, but is on sale for $49 for a limited time.
Just two botnets accounted for 97% of all spam emails in the last three months of 2017, according to a McAfee report released earlier today.
Windows Server, Apache Solr, and Redis servers have been targeted this week by cyber-criminals looking to take over unpatched machines and install malware that mines cryptocurrency (known as a coinminer).
Chinese intelligence agencies are doctoring the Chinese National Vulnerabilities Database (CNNVD) to hide security flaws that government hackers might have an interest in, according to a report released on Friday by US threat intelligence firm Recorded Future.
It has been a pretty slow ransomware week as most of the malware developers have started pushing cryptominers. We did see the continued distribution of the GnuPG based Qwerty Ransomware and a new variant of the GandCrab ransomware that makes it secure again.
A new ransomware has been discovered that utilizes the legitimate GnuPG, or GPG, encryption program to encrypt a victim's files. Currently in the wild, this ransomware is called Qwerty Ransomware and will encrypt a victims files, overwrite the originals, and the append the .qwerty extension to an encrypted file's name.
Türk Telekom, a Turkish Internet Service Provider (ISP), has deployed special hardware to intercept and alter Internet traffic, swapping legitimate software downloads with similar applications, but infected with spyware.
According to a sleuthing Windows Insiders, the name of the next Windows feature update appears to be named "Spring Creators Update". This is based on the output of a command entered in the latest Insider Preview build from the skip ahead ring.
Qarnot, a heater manufacturing company based out of France, may have come up with one of the most innovative uses of cryptocurrency. That is to take the heat generated by mining cryptocoins and use it to heat your home.