Security News
Or so claims Symantec Months before CIA-built hacking tools were leaked to the public by a group calling itself the Shadow Brokers, the exploit code was apparently being used by Chinese state...
Symantec Report Deepens Mystery Around Lost NSA Tools and ExploitsA Chinese hacking group was using exploits and tools developed by the NSA months before the tools were released by another group,...
In a shocking revelation, it turns out that a hacking group believed to be sponsored by Chinese intelligence had been using some of the zero-day exploits linked to the NSA's Equation Group almost...
It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In one notorious case, a...
Use Enpass audit tools to identify weak, identical, and old passwords.
If Enpass is your password manager of choice, there are three handy audit tools you should be using. Jack Wallen explains.
Kaspersky Details MuddyWater’s Post-Infection Tools The MuddyWater cyberespionage group is making use of a broad range of post-infection tools in their attacks, mostly developed in-house,...
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.
Two weeks and counting, and no sign of a fix from Redmond Unlucky Sophos antivirus users face a dilemma: either uninstall the software, or install April's Windows security fixes. That's because...
What appears to be the source code of hacking tools used by an Iranian cyber-espionage group has been posted online along with information apparently stolen from victims. read more