Target settles with banks for $39 million after epic data breach
US retailer Target is back in the headlines again over its 2013 breach. This week, Target has settled on an agreement to pay up …
New ransomware program Chimera threatens to leak user files
Ransomware creators have taken their extortion one step further: in addition to encrypting people’s private files and asking for money before releasing a key, …
Researchers improve de-anonymization attacks for websites hiding on Tor
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing …
Researchers improve de-anonymization attacks for websites hiding on Tor
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing …
Hackers send ‘unexplained’ orders to German Patriot missile battery
This post is appearing on Autoblog Military, Autoblog’s sub-site dedicated to the vehicles, aircraft and ships of the world’s armed forces. Well, this is …
Researcher turns tables, discloses unpatched bugs in Google cloud platform
Vulnerabilities in the Google App Engine cloud platform make it possible for attackers to break out of a first-level security sandbox and execute malicious …
Venom VM bug called “perfect” for NSA, or for stealing bitcoins and passwords
The just-patched critical vulnerability in widely used virtualization software is an ideal exploitation target for state-sponsored spies and criminals alike fishing for passwords, cryptography …
Microsoft fixes 46 flaws in Windows, IE, Office, other products
Fourteen critical vulnerabilities in Internet Explorer were among the targets of Microsoft’s monthly batch of security patches released Tuesday. In all, it fixed 46 …
More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs
After the US Computer Emergency Readiness Team (US-CERT) called pre-installed Superfish “a critical vulnerability affecting Lenovo consumer personal computers,” several lawsuits leveled against Lenovo …
Attackers exploit vulnerabilities in two WordPress plugins
A vulnerability within two widely used WordPress plugins is already being exploited by hackers, putting millions of WordPress sites at risk, according to a …
Recent Comments