Researchers at FireEye have come across a piece of malware that steals payment card data from point-of-sale (PoS) systems and sends it back to the attackers via DNS.
Researchers at FireEye have come across a piece of malware that steals payment card data from point-of-sale (PoS) systems and sends it back to the attackers via DNS.
Oracle’s Critical Patch Update (CPU) for April 2016 was released on Tuesday, bringing 136 security fixes across multiple product families. Many of the vulnerabilities addressed in the update are remotely exploitable, with seven carrying a rating of a 10.0 using the Common Vulnerability Scoring System (CVSS).
Google has been working on improving the overall security of its Android platform, and the Internet giant is not being shy about some of the success it has had in advancing the security of its mobile ecosystem.
Kovter, a recently discovered piece of ransomware, represents the latest step in the evolution of a malicious program from police scareware to ad fraud Trojan and now file-encrypting malware.
Google has updated its User Data Policy for the Chrome Web Store, in an attempt to improve the safety and privacy for users of its Chrome web browser.
A German steel mill, a Ukrainian power grid, and an American dam all walk into a bar... Okay, so what could be the beginning of a bad joke is anything but a joke. No longer are data and dollars the only things at risk in cyber attacks. More and more, hackers are targeting critical infrastructure with the potential to disrupt operations and cause physical damage.
Ransomware authors are always looking for new techniques to make their extortion business more efficient, and researchers have discovered a new method that cybercriminals are using to deliver decryption keys: blockchains.
A hacker using the handle "Phineas Fisher" has described how he hacked into surveillance software maker Hacking Team. Hacking Team is an Italian firm that hacks to order, primarily for law enforcement agencies and intelligence agencies. Last summer, Phineas Fisher (now going by the alias Hack Back!) on Twitter broke into Hacking Team and stole and published thousands of internal documents, some source code and several 0-day exploits.