Banking trojan executes when targets hover over link in PowerPoint doc
Novel infection method doesn’t require link to be clicked. Continue reading Banking trojan executes when targets hover over link in PowerPoint doc
Collaborate Disseminate
Novel infection method doesn’t require link to be clicked. Continue reading Banking trojan executes when targets hover over link in PowerPoint doc
Serial ports don’t have firewalls. Continue reading Sneaky hackers use Intel management tools to bypass Windows firewall
Report warns lack of security talent, glut of legacy hardware pose imminent threat. Continue reading Task force tells Congress health IT security is in critical condition
Cameras with multiple brand names are wide open to remote hacking. Continue reading Internet cameras have hard-coded password that can’t be changed
Turla uses social media and clever programming techniques to cover its tracks. Continue reading You’ll never guess where Russian spies are hiding their control servers
By providing copy of leak, Intercept likely accelerated ID of contractor. Continue reading How a few yellow dots burned the Intercept’s NSA leaker
Comparing hackers to artists, Putin says they may have been inspired by patriotism. Continue reading Putin: “Patriotic” Russian hackers may have interfered in US election
Latest Vault 7 release exposes operation that infects PCs inside targeted networks. Continue reading WikiLeaks says CIA’s “Pandemic” turns servers into infectious Patient Zero
Booz Allen Hamilton engineer posted geospatial intelligence to Amazon S3 bucket. Continue reading Defense contractor stored intelligence data in Amazon cloud unprotected
Mysterious group with cache of NSA exploits promises new release to those who pay. Continue reading New Shadow Brokers 0-day subscription forces high-risk gamble on whitehats