Security News

Anthem last week began notifying 18,000 members affected by a data breach unrelated to 2015's.

Pharmaceutical kingpin Merck reported that operational disruptions continue more than a month after the NotPetya wiper malware attacks.

Makers of Copyfish OCR software get taken on wild ride after code for its Chrome extension is stolen.

At Black Hat last week, an add-on Windows driver and filesystem called ShieldFS was unveiled that detects ransomware and recovers files.

Hackers at DEF CON last week exploited vulnerabilities in electronic pollbooks and voting machines with ease.

The authors behind the Android banking malware family Svpeng have added a keylogger to a recent strain, giving attackers yet another way to steal sensitive data.

Microsoft patched three new Outlook vulnerabilities and re-released updates from a broken June update.

Google’s top Android engineer describes how the attack surface is shrinking on the mobile operating system.

MedSec CEO Justine Bone said shorting companies to profit off discovered vulnerabilities is a viable business model for the security community.

Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers.