Threatpost for B2B
The First Stop For Security News
Updated: 8 hours 30 min ago
The website of Popular Science magazine was found infecting users with malware via the RIG exploit kit.
Microsoft is planning to disable support for the weak SSLv3 protocol in Internet Explorer at some undetermined point in the future.
Researchers with Microsoft have spotted a spike in Crowti, a ransomware similar to Cryptolocker that encrypts files on victims’ machines and then asks for payment to unlock them.
Facebook announced that it has released a host monitoring tool it developed to open source, and that it will increase its Internet Defense Prize payouts to $300,000 in 2015.
The Dyreza Trojan is exploiting the recently disclosed CVE-2014-4114 vulnerability in Windows that was first used by the Sandworm attackers.
Attackers are using BlackEnergy malware to attack HMI software running inside industrial control systems, according to an advisory from ICS-CERT.
The issue of cyberespionage is a thorny one, both technically and politically speaking, but some experts say there may not actually be a solution to the problem.
DHS sounded the alarm Monday on Dyre, the banking Trojan that’s been siphoning bank credentials from large enterprises and major financial institutions.
APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.
WASHINGTON–As things stand right now, the United States has no overarching national information security policy or centralized agency responsible for defending the government’s networks in the event of a serious cyberattack. There have been many pushes over the years to change that and put one agency or another at the head of the table, but […]
WASHINGTON–The United States government and private sector are unprepared for a major cyber attack on the country’s critical infrastructure, a former Congressman said, thanks to a divided, risk-averse Congress and an inability for agencies and other organizations to share information effectively. Tom Davis, a former longtime representative from Virginia, said Tuesday that there are a number of challenges that […]
A round-table consisting of military, government and former NSA officials in Alexandria, Va., on Monday agreed that cyberattacks targeting U.S. critical infrastructure and private industry are an eminent threat.
SANS Internet Storm Center reports attacks against SMTP servers using Shellshock exploits to create a DDoS botnet.
A new iteration of the Android ransomware Koler has surfaced that’s propagating through SMS messages.
Samsung has answered a researcher's critique of alleged encryption and password weaknesses in early version of its Knox technology on Galaxy and Note devices.
A research report claims that Samsung's Knox containers store PIN data in clear text. The report comes shortly after the NSA endorsed Galaxy devices for agency use.
A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan […]
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.
More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.