pindrop-logo-2.svg
Search
Close this search box.
Search
Close this search box.

New Attack Invisibly Monitors Mac Video Calls

There have been a number of pieces of malware to emerge in the last few years that have the ability to hook into the microphone and camera of infected machines, allowing attackers to record private conversations of targeted users. Now a researcher is releasing a new tool that can detect and alert Mac users to hidden […]

Hack iOS 10 and Get $1.5 Million

The stakes in the vulnerability acquisition and bug bounty game have just gone up several notches, with a well-known security startup now offering $1.5 million for a remote jailbreak in iOS 10. The payout was put on the table Thursday by Zerodium, a company that buys vulnerabilities and exploits for high-value target platforms and applications. The company […]

Europol Warns That Ransomware is Biggest Online Threat

Ransomware has become the largest threat to consumers and businesses in the EU, according to a new threat report from Europol. The Internet Organized Crime Threat Assessment points to variants such as Cryptowall, Cryptolocker, Teslacrypt, and CTB-Locker as representing the biggest security problem for European users. Ransomware is not a new threat, but it’s evolved and […]

Facebook Releases Osquery Network Detection Tool for Windows

Facebook has released a new tool that allows administrators and security teams to search for malicious processes, browser extensions, or other problematic issues on their Windows networks. The tool, called osquery, has been available for a couple of years for Linux and OS X environments, but now Facebook engineers have published a Windows version. It’s […]

Nearly All Top Global Companies Have Leaked Credentials Online

Many CSOs live in fear of waking up to an email reporting a data breach at their company, but the threat to an enterprise isn’t limited to a compromise of that specific organization. A new report shows that there are leaked employee credentials online for 97 percent of the top 1,000 global companies, many of which […]

Hackers Activate Tesla’s Brakes From Miles Away

The amount of technology packed into modern cars is kind of amazing. Just a few years ago, the most advanced thing in most vehicles was the cell phone in the user’s pocket. Now, many cars have computer-controlled engines, brakes, entertainment systems, and communications. Cool. The downside of this revolution is that some of these systems can […]

Fighting Account Takeover Attacks With AuthTables

The goal of many attackers is taking over a target account. That can be the account of an admin at a large enterprise, the bank account of a high net-worth victim, or the email account of a human rights activist. While banks and financial services companies are aware of the problem, many other organizations aren’t, […]

Experts Question Legality of Government Hacking

The emergence into the public consciousness of government hacking techniques and activities in recent years has sparked an increasingly loud debate over how and when law enforcement agencies should be allowed to employ these tactics. But that conversation ignores the fact that these techniques may not actually be legal, experts say. Law enforcement agencies, especially the […]

Cisco Warns of Second Firewall Bug Exposed by Shadow Brokers

Cisco is scrambling to patch another vulnerability in many of its products that were exposed as part of the Shadow Brokers dump last month. The latest vulnerability affects many different products, including all of the Cisco PIX firewalls. The latest weakness lies in the code that Cisco’s IOS operating system uses to process IKEv1 packets. […]