Security News > 2018 > May

SEVered Attack Extracts the Memory of AMD-Encrypted VMs
2018-05-29 19:50

Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.

Europol Creates Dark Web Investigations Team
2018-05-29 19:28

The European Union’s law enforcement agency today announced the creation of a dedicated team that will be investigating activity across the dark web. read more

Open Source Tool From FireEye Helps Detect Malicious Logins
2018-05-29 19:16

FireEye has released GeoLogonalyzer, an open source tool that can help organizations detect malicious logins based on geolocation and other data. Many organizations need to allow their employees...

Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
2018-05-29 18:04

Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.

Encryption of AMD EPYC VMs can be broken, researchers prove
2018-05-29 17:54

AMD EPYC server chipsets are supposed to provide a high level of security, but a German team has managed to gain control through a hypervisor exploit.

GDPR vs. ePrivacy: The 3 differences you need to know
2018-05-29 17:48

GDPR isn't the end of stringent regulations for privacy in tech.

BackSwap Trojan exploits standard browser features to empty bank accounts
2018-05-29 17:03

Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in this malware segment...

Will the Real Joker’s Stash Come Forward?
2018-05-29 16:33

For as long as scam artists have been around so too have opportunistic thieves who specialize in ripping off other scam artists. This is the story about a group of Pakistani Web site designers who...

Google Patches reCAPTCHA Bypass
2018-05-29 16:22

An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application.

2018-05-29 15:52

A recently discovered banking Trojan leverages Microsoft SQL Server for communication with the command and control (C&C), IBM has discovered. read more