North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says. With a tool-set that includes zero-day vulnerabilities, destructive malware, and lack of concern when it comes to breaking norms and exasperating heightened tensions in […]

Phishing emails: The ticking time bomb in your inbox

With 3.7 billion users worldwide, who collectively send 269 billion messages every day, email remains the backbone of business communications. Even as other methods of collaboration find their way into the office, from instant messaging and social networking to chat-based applications like Slack, email is the primary way that many of us interact with our […]

Top 10 Anti-Virus Apps for your iPhone and iPads

Apple’s iPhones and iPads can’t be affected by malware in the same way as Windows, but your devices will still be vulnerable to a host of other threats. Whether it’s malicious websites, annoying ads, web trackers or just someone grabbing your device when you’re not looking, there’s plenty to be concerned about. Fortunately, there are […]

Top 10 IoT Security Threats

The Internet of Things (IoT) may be introducing a lot of benefits to modern life, but it also has one huge drawback: security threats. In its 2018 IoT Predictions, Forrester Research noted, “Security vulnerabilities are a significant worry for firms deploying IoT solutions – in fact, it’s the top concern of organizations looking at deploying IoT solutions. However, […]

New Google’s Android P Operating System Will Prevent Background Apps Secretly Accessing Your Camera

The camera of your Android smartphone has often been a vulnerable target for hackers and cybercriminals. Google has taken note of the serious threat of Apps accessing the camera without user’s knowledge and fixed this issue. The latest version of Android OS, Android P will not let any background App access the camera. Android P […]

Bogus Linux vulnerability gets publicity

In the latest example of highly flawed security news about Android and Linux, GoSecure claims it’s discovered Chaos: a Stolen Backdoor Rising Again. Yeah. Right. Let’s look closer. First, we have a neat name. Can’t have a security bug these days without giving it a sexy name. But, what is it really? Well, it requires the attacker to […]

What is an evil maid attack

The once famous ‘Evil Maid’ is again making a comeback. A security firm, F-Secure has issued a fresh warning about possible evil maid attacks by exploiting Intel’s Active Management Technology and other techniques. The spate of fresh evil maid attacks in the wild were discovered by F-Secure senior security consultant Harry Sintonen. Investigations by Sintonen […]

US sets up dedicated office for energy infrastructure cybersecurity

The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on energy infrastructure security and enable more coordinated preparedness and response to natural and man-made threats. “$96 million in funding for the office was included in President […]

What types of hospitals experience data breaches?

An estimated 16 million patient records were stolen in the United States in 2016, and last summer the British health system was crippled by a ransomware attack. While we know these events are on the rise, what do we know about the hospitals that are vulnerable to these attacks? A study in The American Journal […]

Russian, Indian banks lose millions to hackers

The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used the SWIFT system to transfer 339.5 million roubles (around $6 million) to accounts they controlled. No details about the heist have been shared, so we don’t know which bank has […]