All Blogs / Technology / Security / Popular

Why is Java so insecure? Buggy open source components take the blame

Hard-to-patch bugs in Java applications are proving a difficult problem to solve.

Dyre successor TrickBot attacks Australian banks

The old Dyre crew appear to have contributed to a new Trojan with updated, more devastating features.

Trojan Alert – Quant Loader: Trojan for Distributing Malware

Recently a brand new Trojan came into the market called Quant Loader which has been spotted on multiple Russian underground marketplaces. It has been noticed getting distributed with Locky Zepto crypto-ransomware and Pony malware. It...Show More Summary

Lack of security leadership hindering Australian IoT progress: UNSW professor

UNSW cybersecurity professor Jill Slay has criticised the Australian IoT industry for failing to incorporate security into the core design of IoT products, and bemoaned what she sees as a significant lack of cybersecurity leadership in Australia.

NXT floats renaming Office of the Children's eSafety Commissioner

Senators from the Nick Xenophon Team have raised the idea of removing the word 'children' from the name of the eSafety office, saying it limits young adults from going to it for advice.

Who's afraid of WhatsApp?

The Senate Estimates committee focus on the security of WhatsApp missed two key issues. Secure communications is a people problem. And does it even have to be 'secure' in the first place?

How to: Testing Android Application Security, Part 4

One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fourth in a series of posts on pen testing...Show More Summary

Ransomware Variant XTBL Another Example of Popular Malware

We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently received a sample of the low-profile XTBL, a ransomware family that encrypts files and demands ransom from its victims to decrypt the files. Show More Summary

No More Ransom Adds Law Enforcement Partners From 13 Countries

  Intel Security and Kaspersky Labs today announced that 13 law enforcement agencies have joined No More Ransom, a partnership between cybersecurity industry and law enforcement organizations to provide ransomware victims education and decryption tools through Show More Summary

Photos: Robot boats, UAVs and subs on show as Royal Navy looks at future of defence

Unmanned Warrior showcases autonomous boats, drones and submersibles as the Royal Navy looks at the future of warfare.

Leaked files expose faults in official report into inmate's death

When a security researcher found a law firm leaking its own case files, he found himself asking if a police department could've prevented an inmate's death.

Mirai DDoS botnet powers up, infects Sierra Wireless gateways

Sierra Wireless AirLink Gateways are vulnerable to the debilitating botnet, of which source code has been made public.

IBM pressures security researchers, vulnerability exploit code pulled

Big Blue says exploit code released with the reasonably-disclosed bug "puts all customers at risk."

Malware Targeting Cable Modems

LuaBot – a malware targeting Linux platforms was quite active in last few months is trying to spread its wings transcending multiple attack vectors. It potentially also targets IoT devices and web servers turning these infected systems into bots within a larger botnet controlled by a perpetrator. Show More Summary

Your Android smartphone might still be vulnerable to ancient Ghost Push Trojan

Researchers have warned that over half of Android devices are still susceptible to Ghost Push malware.

BOM chief claims no sensitive data taken in 2015 attack

Australian Bureau of Meteorology director Andrew Johnson has said no personal information or sensitive data was taken during the 2015 cybersecurity incident.

Cryptocurrency “DDoSCoin” To Rewards Users Participating In DDoS Attack

DDoS Attack Eric Wurstrow and Benjamin Vandersloot, two researchers, belonging to the University of Michigan and Colorado Boulder University, have recently published a paper that demonstrates how they have developed an alternate cryptocurrency “DDoSCoin” which rewards users that participate in DDoS attacks. Show More Summary

Yahoo brings email forwarding back after 'platform upgrades'

In light of recent hacking revelations at Yahoo Mail, some users could be looking to get out of the service.

Security News This Week: Hackers Hit a Nuclear Plant

Each weekend we round up the news stories that we didn't break or cover in depth but still deserve your attention. The post Security News This Week: Hackers Hit a Nuclear Plant appeared first on WIRED.

Royal Navy tests robot subs, boats and drones for fleet of the future

The Unmanned Warrior exercise tests autonomous submersibles, boats and drones off Scotland and Wales.

Copyright © 2015 Regator, LLC