Security News > 2018 > May

Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.

The European Union’s law enforcement agency today announced the creation of a dedicated team that will be investigating activity across the dark web. read more

FireEye has released GeoLogonalyzer, an open source tool that can help organizations detect malicious logins based on geolocation and other data. Many organizations need to allow their employees...

Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.

AMD EPYC server chipsets are supposed to provide a high level of security, but a German team has managed to gain control through a hypervisor exploit.

GDPR isn't the end of stringent regulations for privacy in tech.

Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in this malware segment...

For as long as scam artists have been around so too have opportunistic thieves who specialize in ripping off other scam artists. This is the story about a group of Pakistani Web site designers who...

An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application.

A recently discovered banking Trojan leverages Microsoft SQL Server for communication with the command and control (C&C), IBM has discovered. read more