Indian nuclear power plant’s network was hacked, officials confirm

Worryingly, attacks on critical infrastructure is becoming more and more common. After initial denial, company says report of “malware in...

Samy Kamkar: PoisonTap – exploiting locked computers over USB

Samy Kamkar: PoisonTap – exploiting locked computers over USB

This is brilliant and scary at the same time. I’m always impressed by what Samy can think of. This particular...

US City Rejects $5.3 Million Ransom Demand and Restores Encrypted Files from Backup (SecAlerts)

This is the right strategy against ransomware. Backup, backup and backup. At the first sign of any ransomware attack it...

Police hijack a botnet and remotely kill 850,000 malware infections – TechCrunch

Police hijack a botnet and remotely kill 850,000 malware infections – TechCrunch

When what you can remotely exploit, you can remotely remove. In a rare feat, French police have hijacked and neutralized...

Responding to Firefox 0-days in the wild

Responding to Firefox 0-days in the wild

This is what a sophisticated cyber attack looks like. Compromise a legitimate email account and send a phishing email from...

Vulnerability in Linksys and Cisco routers

This is a not a good week for network equipment manufacturers. First, it was discovered that over 25000 Linksys Smart...

RIDL and Fallout: MDS attacks

After the spectacle of Spectre and Meltdown last year, we now have more vulnerabilities that attacks the CPU to leak...

Security lapse exposed a Chinese smart city surveillance system | TechCrunch

Security lapse exposed a Chinese smart city surveillance system | TechCrunch

Yet another case of unsecured database in the public cloud. That in itself is unfortunately not uncommon. What is eyebrow-raising...

Remote Code Execution on most Dell computers

Remote Code Execution on most Dell computers

First it was Lenovo and Asus, now Dell has fallen as well. Goes to show that 1) you should uninstall...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17