The malware uses the Tor anonymity network to attack its victims.
One in Three Ex-employees Can Access Corporate Networks
Research shows that insider threats continue long after job termination.
UK Netizens Unmoved by ISP-level Porn Filters
Ofcom report shows only small percentage of users switched on parental controls.
StubHub Breach Part of a Coordinated, International Cybercriminal Ring
Law enforcement agencies in several countries have carried out a joint disruption of the alleged perpetrators.
Internet Explorer Vulnerabilities Double in 2014
Criminals, as ever, adapt to go after low-hanging fruit.
ISACA Revamps COBIT 5 Core Principles
Five new core tenants will underpin the framework.
Nigeria’s 419 Scammers Trade Up to Info-Stealing Trojan Attacks
Palo Alto Networks warns of new risk to businesses from relative malware ‘novices’.
Snowden to Hackers of the World: Build NSA-proof Systems
Technologists also have a ‘civic duty’ to teach those around them how to use tech safely, whistleblower Edward Snowden says.
Kali Linux 1.0.8 Release with EFI Boot Support
The long awaited Kali Linux USB EFI boot support feature has been added to our binary ISO builds, which has prompted this early Kali Linux 1.0.8 release. This new feature simplifies getting Kali installed and running on more recent hardware which requi…
Nasdaq Hackers Used Two Zero Days But Motives a Mystery
US intelligence pointed finger at Moscow but questions remain three years on.