Back to homepage

New Backdoor Trojan Deployed in Cyber-Espionage Campaign Targeting Embassies

A cyber-espionage group believed to be operating out of Russia for the past two decades has deployed a new backdoor trojan on computers at embassies in Southeast Europe, former Soviet states, and


Comparitech Discovers Phishing Scam Targeting Bitcoin Users – IT SECURITY GURU, the privacy advice and security comparison website, has discovered a phishing scam that has been going since 2015 and steals money from novice Bitcoin users who try to transfer


The security status quo falls short with born-in-the-cloud software – Help Net Security

Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will affect more than $1 trillion in IT

IT Compliance

Payment security: What are the biggest challenges? – Help Net Security

With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help


Choose your own price when shopping – SAP PoS terminals open to attack

Security researchers have identified a vulnerability in the Xpress server of the SAP point of sale terminal that allows a small computer, such as a Raspberry Pi not only to steal


Ransomware Is Going More Corporate, Less Consumer

Cybercriminals on average charge $544 for ransom per device, signaling a new sweet spot for payouts. Ransomware is on track to surpass last year’s wave of attacks, and businesses are

Identity Theft

Credit card fraud: What you need to know now – ITworld

Maritza Dominguez has seen some impressive attempts at payment fraud in her 18 months as trust and security lead at Patreon, a site that allows online artists and web content

IT Compliance

How safe are your passwords? Real life rules for businesses to live by – ITworld

Changes to the National Institute of Standards and Technology (NIST) password guidelines were welcomed as long overdue. Security professionals criticized the old guidelines, which recommended a mix of numbers, letters


Jimmy Nukebot Explodes on the Scene, Transforming NeutrinoPOS – Infosecurity Magazine

The NeutrinoPOS banking trojan, a constantly evolving malware thanks to its source code having been posted online last spring, has a new form, ominously dubbed Jimmy Nukebot. Interestingly, it’s no


Locky Ransomware Rears its Head in Big August Campaigns – Infosecurity Magazine

The Locky ransomware is continuing its resurgence, with a second wave of new but related attacks that build on a variant uncovered in early August. A few weeks ago, Locky