Security News

Hacking Team Couldn’t Hack Your iPhone (Threatpost)
2015-07-07 14:45

More than 36 hours after the huge cache of data from Hacking Team’s corporate network was dumped online, researchers are continuing to find surprising bits and pieces in the documents. Among them...

Fraudulent BatteryBot Pro App Yanked from Google Play (Threatpost)
2015-07-06 20:32

Google has pulled a malicious click fraud app from Google Play that spoofs the popular BatteryBot Pro app.

UK Student’s Research a Wassenaar Casualty (Threatpost)
2015-07-06 18:06

Grant Wilcox, an ethical hacking degree candidate at the University of Northumbria in the U.K., said the Wassenaar Arrangement rules were one reason he decided not to publish exploits he developed...

Ad Fraud Malware Updating Flash on Infected PCs (Threatpost)
2015-07-06 17:59

Ad fraud malware is one of the more profitable specialties in the cybercrime world, and the attackers who use it often have to adapt their tactics in order to keep the money rolling in. One of the...

Command Injection Vulnerabilities Plague IP Enabled AirLive Cameras (Threatpost)
2015-07-06 16:14

Core Security disclosed information on command-injection vulnerabilities found in a number of AirLive IP-enabled cameras after repeated attempts to disclose to the manufacturer were ignored.

Hackers Release Hacking Team Internal Documents After Breach (Threatpost)
2015-07-06 14:09

Attackers have compromised the network of Italian intrusion software vendor Hacking Team and released a large cache of the company's private documents, including customer invoices that show sales...

June Harvard Breach Hit Multiple Schools (Threatpost)
2015-07-03 14:00

Harvard University warned students of a data breach that may have exposed school network and email logins.

Threatpost News Wrap, July 3, 2015 (Threatpost)
2015-07-03 13:00

Dennis Fisher and Mike Mimoso discuss the OS X and iOS patches, the potential for the new cyber UL project run by Mudge, and the lawsuit against OPM after its data breach.

Evasion Techniques Keep Angler EK’s Cryptowall Business Thriving (Threatpost)
2015-07-02 17:03

The SANS Internet Storm Center reports that the Angler Exploit Kit, pushing Cryptowall 3.0 ransomware, uses rapidly changing URL patterns—almost daily changes—to evade detection and rake in profits.

Senator Demands Answers on FBI’s Use of Zero Days, Phishing (Threatpost)
2015-07-02 15:06

The chairman of the powerful Senate Judiciary Committee is asking some pointed questions of the FBI director about the bureau’s use of zero-day vulnerabilities, phishing attacks, spyware, and...