Security News

Breach at Third Party Contractor Affects 18,000 Anthem Members (Threatpost)
2017-08-01 16:28

Anthem last week began notifying 18,000 members affected by a data breach unrelated to 2015's.

Pharmaceutical Giant Still Feeling NotPetya’s Sting (Threatpost)
2017-08-01 14:14

Pharmaceutical kingpin Merck reported that operational disruptions continue more than a month after the NotPetya wiper malware attacks.

Copyfish Browser Extension Hijacked to Spew Spam (Threatpost)
2017-08-01 12:00

Makers of Copyfish OCR software get taken on wild ride after code for its Chrome extension is stolen.

ShieldFS Can Detect Ransomware, Recover Files (Threatpost)
2017-07-31 20:33

At Black Hat last week, an add-on Windows driver and filesystem called ShieldFS was unveiled that detects ransomware and recovers files.

Voting Machines Hacked with Ease at DEF CON (Threatpost)
2017-07-31 19:24

Hackers at DEF CON last week exploited vulnerabilities in electronic pollbooks and voting machines with ease.

Android Banking Trojan Svpeng Adds Keylogger (Threatpost)
2017-07-31 18:28

The authors behind the Android banking malware family Svpeng have added a keylogger to a recent strain, giving attackers yet another way to steal sensitive data.

Microsoft Releases Outlook and Office Click-to-Run Patches (Threatpost)
2017-07-31 17:00

Microsoft patched three new Outlook vulnerabilities and re-released updates from a broken June update.

How Google Shrunk The Android Attack Surface (Threatpost)
2017-07-31 12:00

Google’s top Android engineer describes how the attack surface is shrinking on the mobile operating system.

Shorting-For-Profit Viable Business Model For Security Community (Threatpost)
2017-07-28 11:20

MedSec CEO Justine Bone said shorting companies to profit off discovered vulnerabilities is a viable business model for the security community.

Attack Uses Docker Containers To Hide, Persist, Plant Malware (Threatpost)
2017-07-27 23:30

Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers.