The group has leaked more than 3,500 names, email addresses and contact numbers of law enforcement and military personnel.
Coffeemakers, Baby Monitors and More Open Up Big IoT Security Holes
Kaspersky Lab’s investigation into the connected home discovered that almost all of the devices tested contained vulnerabilities.
iPhone-targeting XcodeGhost Malware Infiltrates US Enterprises
XcodeGhost has maintained persistence—and has indeed evolved to become even more dangerous.
Vulnerability Remediation Much Slower Than Criminal Exploits
Most organizations fail to secure the holes within their environment faster than cyber-criminals can wreak havoc.
The Return of Angler EK: Chinese Website Redirects to Cryptowall 3.0
The Angler exploit kit has freshened up with new Flash exploits and watering-hole techniques.
FIDO Alliance Certifies New iOS, Mobile Devices
Android, Apple, iOS and TouchID users can leverage FIDO authentication in devices, services and applications instead of passwords.
Zero-Day Attack Compromises a Half-Million Web Forum Accounts—Report
Visitors to forums based on vBulletin and possibly Foxit Software are in danger of having their personal information stolen.
Mac OS X Malware Soars in 2015
Bit9 + Carbon Black warns ‘security by obscurity’ no longer offers protection
IBM’s SoftLayer Pegged as Number One Spammer
Cloudmark report urges Big Blue to crack down on Brazilian crime.
US Government Launches New Cyber Security Strategy Plan
Don’t expect a ‘one-shot silver bullet.’