Regin APT Attacks Among the Most Sophisticated Ever Analyzed
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
1433 articles
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never made.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Brian Donohue and Dennis Fisher talk about a new attack on the SSL protocol, which is now known as POODLE.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.