Mission critical processes at risk, says IOActive
North Korean Defectors Targeted in Mobile Espionage Campaign
The malware intercepts SMS messages, contact information, GPS location, phone call logs, installed apps and contacts; it can also record phone calls.
In Wake of Russia Ban, Fancy Bear Tries to Discredit the Olympics…Again
It has released dozens of emails purported to be from antidoping officials at the International Olympic Committee and elsewhere.
RIG EK Activity Declines in Q4
The exploit kit nonetheless has hung onto its lead as the most active EK out there this quarter.
Mueller Appoints Cyber Expert to Trump Probe Team
Ryan Dickey joins 16 other lawyers as investigation heats up
Cyber Security Challenge UK Appoints New CEO
Colin Lobley will take up the role following the death of Stephanie Daman
Fruitfly Malware Creator Allegedly Spied on Victims for 13 Years
Ohio programmer is indicted on 16 counts
Equifax Would Have Paid $1.5bn Under New US Breach Laws
Democrat senators Warren and Warner introduce new legislation
Bad Botnet Growth Skyrockets in 2017
There was a 37% increase in botnet command-and-control (C&C) listings in 2017, with the majority (68%) of them being hosted on servers run by threat actors.
CoffeeMiner Forces Coffee Shop Visitors to Mine for Monero
Bad guys can access all of the compute power connected to a particular public Wi-Fi network, all at once, to mine for cryptocurrency.