Security News

Hikvision recently patched a backdoor in a slew of its cameras that could have made it possible for a remote attacker to gain full admin access to affected devices.

The open source HandBrake project is warning anyone who recently downloaded the Mac version of the software that they’re likely infected with malware.

Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich found a remotely exploitable Windows vulnerability that Ormandy called he worst in recent memory.

Security firm Embedi releases further details on the Intel AMT flaw, revealing how it can be exploited and how potentially dangerous it can be.

Microsoft shuts down hackers who hijacked a software updater with fileless, or in-memory, malware attacks.

More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising.

The news of the week is discussed, including the Gmail/Google Docs phishing attack, the Intel AMT vulnerability, IBM's malware-laden USB drives, and drone security.

The FBI says Business Email Compromise scams are growing at astronomical rates, and businesses have lost $5.3 billion since 2013; $346 million in the U.S. alone in the second half of 2016.

Hackers behind the Carbanak criminal gang have devised a clever way to gain persistence on targeted systems to more effectively pull off financially motivated crimes.

Cisco has uncovered a remote administration tool called Konni that it says has been used in attacks against government agencies and public organizations linked to North Korea.