Support for USB log-in keys should encourage secure authentication
Press Release Leak Spawns Insider Trading Bonanza
Assets with little face value—and therefore protected with minimal security—have been converted into significant monetary gain.
Windows 10’s Edge Gets First Critical Patch as Admins Get 14 Bulletins
New browser already targeted in a busy month for IT staff
Carphone Warehouse Hackers May Have DDoS-ed Firm
DDoS increasingly used to distract IT teams ahead of data theft
Over Half of Android Devices Hit by Remote Control Bug
Hackers could exploit deserialization vulnerability to steal sensitive data
US CERT: Zero-Day-based Phishing Campaign Rampages
The campaigns target US government agencies and private sector organizations across multiple sectors.
Darkhotel APT Group Resurfaces with Hacking Team Zero-Day
Darkhotel is the latest APT group to make use of the zero-days and exploit tools leaked in the Hacking Team breach.
Kali Linux 2.0 Release – Sana
Our Next Generation Penetration Testing Platform
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new [Kali Linux Dojo](](/docs/development/dojo-mastering-live-build/), which was a bla…
YouTube: A Key Enabler for Voyeurism?
YouTube hosts thousands of videos, which offer: tutorials on how to use RATs; the faces and IP addresses of victims; and links to download RATs they can use to slave devices.
Networking Biz Ubiquiti Transfers $46.7 Million to Fraudsters
SEC filing claims ‘employee impersonation’ was to blame