Registered users’ names, email addresses and order history have been accessed.
Nuclear EK Infects Major Nonprofit with Kelihos
The bot is used to send spam email, capture sensitive information or download and execute malicious files.
Pentagon to Develop Lethal Cyber-Weapons—Report
Computer code and cyber-weapons capable of killing adversaries will be developed under a new half-billion-dollar military contract.
Lack of Employee Security Training Plagues US Businesses
About 10% of employees have lost a device with sensitive business info, 12% use shadow IT and 37% have access to information that is above their position.
Teenage ‘Cracka’ Hackers Hit FBI Deputy Director
The group has leaked more than 3,500 names, email addresses and contact numbers of law enforcement and military personnel.
Coffeemakers, Baby Monitors and More Open Up Big IoT Security Holes
Kaspersky Lab’s investigation into the connected home discovered that almost all of the devices tested contained vulnerabilities.
iPhone-targeting XcodeGhost Malware Infiltrates US Enterprises
XcodeGhost has maintained persistence—and has indeed evolved to become even more dangerous.
Vulnerability Remediation Much Slower Than Criminal Exploits
Most organizations fail to secure the holes within their environment faster than cyber-criminals can wreak havoc.
The Return of Angler EK: Chinese Website Redirects to Cryptowall 3.0
The Angler exploit kit has freshened up with new Flash exploits and watering-hole techniques.
FIDO Alliance Certifies New iOS, Mobile Devices
Android, Apple, iOS and TouchID users can leverage FIDO authentication in devices, services and applications instead of passwords.