The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, SEPTEMBER 28, 2016

Featured

Archives

Latest Comments

Social Networks

As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged out of my account: Beveiligingscontrole. Since curiosity is a positive element when it comes to […]

Read more ...

New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom. Previous versions of these threats locked the screen and used a hardcoded passcode, but analysts were able to reverse engineer the code to provide victims with the passcode to unlock their devices. Attackers have also combined a […]

Read more ...

A new piece of Mac malware, dubbed Komplex, has been discovered by Palo Alto Networks. This malware provides a backdoor into the system, like most other recent Mac malware. Where it gets most interesting, though, isn’t in its capabilities, but in the connections it allows us to make. The implementation of Komplex is actually anything but […]

Read more ...

Hacking any system as complex as a car requires digging up not just one vulnerability but a series of exploitable bugs that create a path through the target’s maze of defenses. So when researchers at the Chinese firm Tencent revealed they could burrow through the Wifi connection of a Tesla S all the way to […]

Read more ...