All Blogs / Technology / Security / Popular


iOS, Mac vulnerabilities allow remote code execution through a single image

Researchers have discovered that image files can bury malware, allowing malicious code access without detection.

Snowden iPhone case tells you in real time when you are being spied on

The mobile device case will let you know when data is moving without your permission.

Cybersecurity company executives plead guilty to hacking rival firm

Not only did the Quadsys staff reportedly break into servers, they were caught doing it.

Phishing Attacks Employ Old but Effective Password Stealer

A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One thing about this malware stood out: the subdirectory used in the access panel URL. It contained the string “=U=TEAM” (which we have obfuscated). Show More Summary

How the Republican Convention Fends Off Hackers

Security at the convention is crucial both online and off. The post How the Republican Convention Fends Off Hackers appeared first on WIRED.

Now You Can Hide Your Smart Home on the Darknet

The privacy-focused Tor Project backs a new initiative that lets you use Tor to keep your home's Internet-of-things devices hidden from hackers. The post Now You Can Hide Your Smart Home on the Darknet appeared first on WIRED.

Hidden 'backdoor' in Dell security software gives hackers full access

The critical flaw gives an attacker 'full control' of all connected devices.

Congress' website was down for three days

The Library of Congress and the US Copyright Office also suffered.

Cray, Deloitte team up on supercomputer-powered threat analytics

The subscription-based service aims to help organizations combat cyberattacks by finding holes in their networks.

WikiLeaks Dumps ‘Erdogan Emails’ After Turkey’s Failed Coup

The secret-spilling group's latest publication claims to shed light on the circumstances of Turkey's recent armed uprising and the crackdown that's followed. The post WikiLeaks Dumps 'Erdogan Emails' After Turkey's Failed Coup appeared first on WIRED.

Amazon isn't saying if Echo has been wiretapped

Its transparency reports only includes data demands to its cloud-stored data.

Pentagon gives green light for BlackBerry's BES 12

The approval will allow BlackBerry users to carry out low-level secure work.

A New Service Alerts You When Someone Uses Your Social Security Number

Civic focuses on monitoring your Social Security number to prevent identity theft, so you don't have to chase it down after the fact. The post A New Service Alerts You When Someone Uses Your Social Security Number appeared first on WIRED.

Thanks, script kiddies: 100Gbps DDoS attacks now commonplace

You need nothing more than a grudge and an Internet connection to launch attacks on a massive scale.

15-year-old httpoxy flaw causes developer patch scramble

Httpoxy leaves a range of server-side software open to easy exploit.

Russian security firm denies links to Carbanak Trojan

Are some Russian cybersecurity firms only a mask for criminal enterprise?

Meet the hacker who tries to break Yahoo every day

No matter how strong a company's defenses, the red team should "always win."

Lucky Green abandons Tor Project over ethics, takes core node with him

The exit of one of Tor's earliest contributors is yet another blow to the project.

Silent Circle snaps up $50 million in fresh funding

The investment will be used to boost the firm's enterprise platform.

US may let foreign states serve warrants on tech firms, but only if feds can do the same

The deal, which would have to be approved by Congress, will give the US government "reciprocal" authority to search data in other countries.

Copyright © 2015 Regator, LLC