The SANS Institute has discovered a scareware campaign targeting Mac OS X machines using an installer signed with a legitimate Apple developer certificate.
Banking Trojans were very active in 2015, but were just one of many threats consumers and businesses had to face: ransomware activity increased throughout the year, and extortive attacks proved to be big concern for businesses as well.
A group of former and current students have sued Google in federal court in San Jose, California, alleging that the company scanned their Gmail accounts and gathered data for advertising purposes.
Mike Mimoso and Chris Brook discuss the news of the week including internet-connected teddy bears, the latest on the Going Dark debate, and whether or not there's a backdoor in Socat. They also preview next week's Security Analyst Summit in Tenerife, Spain.
The details of users who registered accounts on the forums dedicated to Bohemia Interactive’s DayZ video game have been stolen by hackers, the developer warned on Thursday.
DayZ is an open world survival video game that is currently in early access Alpha. First released in December 2013, the game had already reached 3 million sales by January 2015.
A massive string of WordPress compromises are redirecting victims to the Nuclear Exploit Kit and Teslacrypt ransomware.
A National Security Council member promised Rep. Jim Langevin that a final U.S. rule on the Wassenaar Arrangement would not happen without another public comment period.
Dell announced the availability of a new enterprise endpoint security solution that now features post-boot BIOS verification, along with integrated threat protection technology powered by Cylance.
A researcher has made available exploits for a couple of serious vulnerabilities in Netgear’s ProSAFE NMS300 network management system for which the vendor has yet to release patches.
Netgear’s ProSAFE NMS300 Management System is designed to make it easy for administrators to monitor and manage their networks from a web-based interface.
Netgear's Network Management System suffers from two vulnerabilities, an arbitrary file upload and a path traversal, which could let a remote attacker execute code and download files.