Blog

Blog

Ghost Push malware continues to haunt Android users

Android users are being reminded to only install apps from the official Google Play store or trusted third parties, after new research has revealed an alarming number of devices continue to be infected by a notorious family of malware. Security researchers at Cheetah Mobile Security claim that it is responsible for most of the Android infections...
Blog

Hacker grabs over 58 million customer records from data storage firm

At least 58 million people have had their personal information published on the internet - including their names, dates of birth, email and postal addresses, job titles, phone numbers, vehicle data, and IP addresses - after a hacker stole a massive unsecured database. And, if you think that sounds bad, there may be yet more hacked data still to be...
Blog

Bank cyber heists are here to stay, says SWIFT security chief

Money makes the world go around, and SWIFT - the worldwide inter-bank communication network - is the system that allows banks to send money to each other. So when online criminals find a way to exploit SWIFT, they can transfer huge amounts of money to bank accounts under their control. As we have...
Blog

Mail's Here! And With It a Malware-Laden USB Stick, Warns Aussie Police

Australian police is advising people to be on the lookout for unmarked, malware-laden USB sticks that someone is dropping into their mailboxes. On 21 September, the Victoria Police published a statement revealing that residents of the suburb of Pakenham in Victoria's capital Melbourne are discovering unmarked USB drives in their mailboxes. Here's a...
Blog

Report claims national security was put at risk by the OPM data breach

A Congressional investigation into the devastating hack of the US government's Office of Personnel Management (OPM) has detailed shortcomings in the organisation's security and made recommendations for other federal departments to prevent the same from happening to them. The hefty 227-page report doesn't pull its punches about the seriousness of the...
Blog

How one company lost $44 million through an email scam

One of the world's leading wire and cable manufacturers, Leoni AG, has been swindled out of a jaw-dropping 40 million Euros (approximately US $44 million) after it was targeted by an email scammer. As Softpedia reports, a young woman working in the finance department of Leoni's factory in Bistrita, Romania, received an email in mid-August claiming...
Blog

Found an iOS zero-day? This firm will pay you $300,000 more than Apple

It's just a week since Apple announced its first-ever bug bounty for researchers who find vulnerabilities in its widely-used software and hardware, in the hope that it can provide better security and privacy to its millions of customers. The Cupertino-based company made headlines for its belated entry into the bug bounty marketplace, offering up to ...
Blog

Does dropping malicious USB sticks really work? Yes, worryingly well...

Good samaritans and skinflints beware! Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach. This is no secret, of course. We have all (hopefully) been aware of the dangers of inserting an unknown USB device into our computers for some time. Heck, the technique has even made it into the...
Blog

How Your Smartwatch or Fitness Tracker Could Reveal Your ATM PIN

Quick question - are you right or left handed? That's a harmless enough question, but here's the follow-up: do you wear a smartwatch or fitness tracker on that same wrist? If you do, then you may want to rethink whether that was a sensible choice after you've read about some fascinating research done by a group of scientists from Binghamton...
Blog

Exploit Kit Campaign Targeting Out-of-Date Joomla! and WordPress Sites

An new exploit kit campaign is targeting websites running on out-of-date versions of the Joomla! and WordPress content management system (CMS). Researchers at Sucuri have been tracking the campaign for the past several weeks. They've codenamed it "Realstatistics" because it injects fake analytics code for "realstatistics[.]info" or "realstatistics[....
Blog

The Android Ransomware Threat has Quadrupled in Just One Year

If you need any more evidence that ransomware has become a major problem, just look at how online criminals are busily developing attacks against platforms other than Windows. Yes, Windows continues to be the operating system most commonly targeted with ransomware threats - but malware that attempts to extort money out of you is also being actively...
Blog

So, Just Why Is 18atcskd2w Such a Popular Password?

Users of popular online forums are being advised to change their passwords following the leak of some 45 million credentials. As LeakedSource reports, millions of user credentials from over 1,100 websites and communities - including techsupportforum.com, autoguide.com, petsguide.com and motorcycle.com - have been exposed after parent company...
Blog

TeamViewer denies hack, as users claim computers remotely hijacked

In the last day or two, there have been a spate of posts by TeamViewer users claiming that their computers have been hijacked by malicious hackers, their PayPal and other banking accounts emptied, their webmail accessed, and malicious software installed. And the victims seem to believe the attacks are linked to their use of TeamViewer. ...