Hard-to-patch bugs in Java applications are proving a difficult problem to solve.
The old Dyre crew appear to have contributed to a new Trojan with updated, more devastating features.
Recently a brand new Trojan came into the market called Quant Loader which has been spotted on multiple Russian underground marketplaces. It has been noticed getting distributed with Locky Zepto crypto-ransomware and Pony malware. It...Show More Summary
UNSW cybersecurity professor Jill Slay has criticised the Australian IoT industry for failing to incorporate security into the core design of IoT products, and bemoaned what she sees as a significant lack of cybersecurity leadership in Australia.
Senators from the Nick Xenophon Team have raised the idea of removing the word 'children' from the name of the eSafety office, saying it limits young adults from going to it for advice.
The Senate Estimates committee focus on the security of WhatsApp missed two key issues. Secure communications is a people problem. And does it even have to be 'secure' in the first place?
One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth in a series of posts on pen testing...Show More Summary
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently received a sample of the low-profile XTBL, a ransomware family that encrypts files and demands ransom from its victims to decrypt the files. Show More Summary
Intel Security and Kaspersky Labs today announced that 13 law enforcement agencies have joined No More Ransom, a partnership between cybersecurity industry and law enforcement organizations to provide ransomware victims education and decryption tools through www.nomoreransom.org. Show More Summary
Unmanned Warrior showcases autonomous boats, drones and submersibles as the Royal Navy looks at the future of warfare.
When a security researcher found a law firm leaking its own case files, he found himself asking if a police department could've prevented an inmate's death.
Sierra Wireless AirLink Gateways are vulnerable to the debilitating botnet, of which source code has been made public.
Big Blue says exploit code released with the reasonably-disclosed bug "puts all customers at risk."
LuaBot – a malware targeting Linux platforms was quite active in last few months is trying to spread its wings transcending multiple attack vectors. It potentially also targets IoT devices and web servers turning these infected systems into bots within a larger botnet controlled by a perpetrator. Show More Summary
Researchers have warned that over half of Android devices are still susceptible to Ghost Push malware.
Australian Bureau of Meteorology director Andrew Johnson has said no personal information or sensitive data was taken during the 2015 cybersecurity incident.
DDoS Attack Eric Wurstrow and Benjamin Vandersloot, two researchers, belonging to the University of Michigan and Colorado Boulder University, have recently published a paper that demonstrates how they have developed an alternate cryptocurrency “DDoSCoin” which rewards users that participate in DDoS attacks. Show More Summary
In light of recent hacking revelations at Yahoo Mail, some users could be looking to get out of the service.
Each weekend we round up the news stories that we didn't break or cover in depth but still deserve your attention. The post Security News This Week: Hackers Hit a Nuclear Plant appeared first on WIRED.
The Unmanned Warrior exercise tests autonomous submersibles, boats and drones off Scotland and Wales.