177
40 Views
Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware.

Though the new malware campaigns are not customized for each organization, the threat actors appear to be more
170
44 Views
'Unnecessary scaremongering' but still some work to be done

Reports that the Home Office's Brexit app contains "serious vulnerabilities" that could expose the phone numbers, addresses and passport details of EU citizens are overblown, say security experts.…

177
36 Views

In an era where cyberattacks are constantly on the rise, every business must employ adequate security measures to protect ones



How A WAF Can Benefit A Business From Cyber Attacks on Latest Hacking News.

0
10 Views
You know what they say: Timing is... everything

Trusted Platform Modules, specialized processors or firmware that protect the cryptographic keys used to secure operating systems, are not entirely trustworthy.…

0
0 View
You know what they say: Timing is... everything

Trusted Platform Modules, specialized processors or firmware that protect the cryptographic keys used to secure operating systems, are not entirely trustworthy.…

170
18 Views
What could be even worse than getting hacked?

It's the "failure to detect intrusions" that always results in huge losses to the organizations.

Utah-based technology company InfoTrax Systems is the latest example of such a security blunder, as the company was breached more than 20 times from May 2014 until March 2016.

What's ironic is that the company detected the breach only after it
170
51 Views

Following Avast, we now hear of a security bug in McAfee antivirus. Researchers have found this vulnerability to affect all



Serious Security Vulnerability Found In All McAfee Antivirus Editions on Latest Hacking News.

224
21 Views
A team of cybersecurity researchers today disclosed details of two new potentially serious CPU vulnerabilities that could allow attackers to retrieve cryptographic keys protected inside TPM chips manufactured by STMicroelectronics or firmware-based Intel TPMs.

Trusted Platform Module (TPM) is a specialized hardware or firmware-based security solution that has been designed to store and protect
228
20 Views
Zombieload is back.

This time a new variant (v2) of the data-leaking side-channel vulnerability also affects the most recent Intel CPUs, including the latest Cascade Lake, which are otherwise resistant against attacks like Meltdown, Foreshadow and other MDS variants (RIDL and Fallout).

Initially discovered in May this year, ZombieLoad is one of the three novel types of microarchitectural data
236
35 Views
Complying with cyber regulations forms a significant portion of the CISO's responsibility. Compliance is, in fact, one of the major drivers in the purchase and implementation of new security products.

But regulations come in multiple different colors and shapes – some are tailored to a specific vertical, while others are industry-agnostic. Some bare explicit consequences for failing to comply
200
19 Views
Supermarket says it's innocent and we don't need more than that, ICO told judges

The UK's Information Commissioner urged the Court of Appeal to side with Morrisons in the supermarket’s battle to avoid liability for the theft and leaking of nearly 100,000 employees’ payroll details – despite not having read the employees’ legal arguments.…

183
23 Views
Case to be heard in full next year

A man will appear at Crown court in December to answer charges that he used hacking program Sentry MBA to access and take money from online UK National Lottery gambling accounts.…

173
39 Views
Prosecutors say 29 year-old was mastermind of prolific 'Cardplanet' operation

A Russian man was detained at Dulles airport in Washington DC on Monday and charged with running a stolen card trading ring that was responsible for $20m worth of fraud.…

167
19 Views
Alarm raised over more holes in third-party low-level code

Nearly three months after infosec biz Eclypsium highlighted widespread security weaknesses in third-party Windows hardware drivers, you can now add Intel to the list of vendors leaving holes in their all-powerful low-level code.…

163
18 Views
Massachusetts judge reminds America of that little thing called the Fourth Amendment

The seizure and search of phones and laptops at the US border is unconstitutional, a judge said Tuesday in a landmark ruling.…

170
16 Views
It appears that Facebook at the center of yet another issue involving privacy.

Reportedly, multiple iPhone users have come forward on social media complaining that the Facebook app secretly activates their smartphone's camera in the background while they scroll through their Facebook feeds or looking at the photos on the social network.

As shown in the Twitter videos below, when users click
188
26 Views
Intel joins the fun with monthly releases from Adobe, SAP

Patch Tuesday  The November edition of Patch Tuesday has landed with scheduled updates from Microsoft, Adobe, and SAP, along with the debut of a new update calendar from Intel.…

170
15 Views
Boffins say even latest chips can be twisted into leaking data between processor cores

Intel is once again moving to patch its CPU microcode following the revelation of yet another data-leaking side-channel vulnerability.…

178
20 Views
Security suite falls victim to malicious DLLs

Three of McAfee's anti-malware tools have been found to contain a vulnerability that could potentially allow an attacker to bypass its security protections and take control of a PC.…

196
55 Views
Mass-mail fail followed outfit's appearance at jobs fair

BT Security managed to commit the most basic blunder of all after emailing around 150 infosec professionals who attended a jobs fair – using the "cc" field instead of "bcc".…

170
55 Views
'Really very everyday' – report

The UK's Labour Party says its campaign site has been the target of "sophisticated and large-scale cyber-attack" and has informed GCHQ's National Cyber Security Centre.…

0
9 Views
Humankind had come a long way from the time when the Internet became mainstream. What started as a research project ARPANET (Advanced Research Projects Agency Network) funded by DARPA has grown exponentially and has single-handedly revolutionized human behavior.

When WWW (world wide web) came into existence, it was meant to share information over the Internet, from there part through natural
0
10 Views
Security incidents occur. It's not a matter of 'if' but of 'when.' There are security products and procedures that were implemented to optimize the IR process, so from the 'security-professional' angle, things are taken care of.

However, many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process with their management a much more
0
7 Views
Mobile app SDKs sport dodgy crypto defaults, set bad examples – updates available

It has been revealed that Adobe's Experience Platform mobile SDKs, used to create apps that interact with the company's cloud services, until recently contained sample configuration files that created insecure default settings.…

0
8 Views

Continuing the new normal of fixing things after major security breaches, Facebook has once again made it into the news.



Facebook Makes Changes To Groups API Following Privacy Breach on Latest Hacking News.

0
8 Views

This week Google has made a revelation for their users regarding a zero-day vulnerability in the Google Chrome browser under



Google Discloses Zero-Day Vulnerability In Chrome Browser Under Active Exploitation on Latest Hacking News.

0
7 Views
Mozilla, in partnership with Facebook, Cloudflare, and other IETF community members, has announced technical specifications for a new cryptographic protocol called "Delegated Credentials for TLS."

Delegated Credentials for TLS is a new simplified way to implement "short-lived" certificates without sacrificing the reliability of secure connections.

In short, the new TLS protocol extension aims
0
6 Views
Microsoft seems a bit hazy on what 'disable' actually means

A security hole in Office for Mac can be exploited by miscreants to potentially run malicious code on victims' shiny computers without anyone noticing.…

0
6 Views
Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely.

Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid.

According to several local media, Everis informed its employees about the devastating
0
0 View
Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely.

Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid.

According to several local media, Everis informed its employees about the devastating
0
5 Views
Including Spanish camgirl sites spill info, domain registrars hacked

Roundup  Let's check out some of the more recent security happenings beyond what we've already covered.…

Newsletter
Sign up for our newsletter


Unsubscribe at Anytime | Privacy Policy
Welcome, DisDroidians

Sign up and post your links!

Most Viewed Stories
Latest Comments
Statistics
Disdroid.co.uk - ranking and value