The Common Vulnerabilities and Exposures (CVE) turns 21 this year and, just like any 21-year-old, there have been growing pains along the way. This is the story of how it made it this far. | Continue reading
A German university is going 'old school' and issuing new passwords for the email accounts of all 38,000 of its students and staff ... by hand, after unknown malware was discovered in the university computer network. | Continue reading
Russia has blocked one of the domains used by stock photo and footage agency, Shutterstock, after it posted a photo of a small Russian flag planted in a pile of faeces. | Continue reading
If street crime statistics matched those of cybercrime, we would be living in the Wild West. In fact, it would be beyond the Wild West. It would be mayhem. | Continue reading
Spear-phishing was behind the hack of Australia's Parliament House that saw attackers remain in the parliamentary network for eight days. But how did the hackers remain in the system for this length of time and what happened during those eight days? | Continue reading
Spear-phishing was behind the hack of Australia's Parliament House that saw attackers remain in the parliamentary network for eight days. But how did the hackers remain in the system for this length of time and what happened during those eight days? | Continue reading
US Attorney General William Barr has said Chinese tech giants Huawei and ZTE | Continue reading
If street crime statistics matched those of cybercrime, we would be living in the Wild West. In fact, it would be beyond the Wild West. It would be mayhem. | Continue reading
If street crime statistics matched those of cybercrime, we would be living in the Wild West. In fact, it would be beyond the Wild West. It would be mayhem. | Continue reading
Two critical vulnerabilities, both of which allow remote code execution on affected systems, have been found in rConfig, the free open-source configuration management utility which is used across 3.3 million devices. | Continue reading
Two critical vulnerabilities, both of which allow remote code execution on affected systems, have been found in rConfig, the free open-source configuration management utility which is used across 3.3 million devices. | Continue reading
The Security Audit Tool is a web based vulnerability scanner that looks for the last 6 months of vulnerabilities that may affect a given URL. | Continue reading
The Security Audit Tool is a web based vulnerability scanner that looks for the last 6 months of vulnerabilities that may affect a given URL. | Continue reading
The Australian Federal Police's first "restraint and forfeiture of Bitcoin" has hit paydirt with a 20-fold return after a gun runner was charged with the importation of three firearms. | Continue reading
See which software and vendors have the most CVEs for 2019. | Continue reading
CVE-2019-13602 reveals an Integer Underflow in the MP4 file format of the VLC Media Player | Continue reading
Android users are being charged hundreds of dollars for everyday apps such as calculators and barcode readers, and it's all being done within the guidelines of the in-app purchasing policy of the Google Play store. | Continue reading
An unpatched vBulletin zero day with the potential to affect tens of millions of users has been published by an anonymous security researcher. | Continue reading
An unpatched vBulletin zero day with the potential to affect tens of millions of users has been published by an anonymous security researcher. | Continue reading
An unpatched vBulletin zero day with the potential to affect tens of millions of users has been published by an anonymous security researcher. | Continue reading
Seventeen US utility companies - upgraded from three companies - were targeted by speak-phishing attacks between early April and late August this year. | Continue reading
Microsoft has taken the rare step of releasing fixes outside its usual Patch Tuesday roundup and released an emergency security update to fix two critical issues, one an Internet Explorer zero-day vulnerability and the other a Microsoft Defender bug. | Continue reading
Two ad blocking extensions being used by over 1.5 millions users have been removed from the Google Chrome Web Store because they are fake. | Continue reading
Two ad blocking extensions being used by over 1.5 millions users have been removed from the Google Chrome Web Store because they are fake. | Continue reading
The latest version of Windows Defender fails after a few seconds when it runs both a Quick or Full scan and only scans a few files. | Continue reading
The latest version of Windows Defender fails after a few seconds when it runs both a Quick or Full scan and only scans a few files. | Continue reading
The latest version of Windows Defender fails after a few seconds when it runs both a Quick or Full scan and only scans a few files. | Continue reading
Three North Korean hacking groups, one of which was behind the WannaCry ransomware attacks, have had sanctions placed on them by the US Treasury. | Continue reading
Three North Korean hacking groups, one of which was behind the WannaCry ransomware attacks, have had sanctions placed on them by the US Treasury. | Continue reading
Three North Korean hacking groups, one of which was behind the WannaCry ransomware attacks, have had sanctions placed on them by the US Treasury. | Continue reading
Three North Korean hacking groups, one of which was behind the WannaCry ransomware attacks, have had sanctions placed on them by the US Treasury. | Continue reading
The trojan malware botnet Emotet has reappeared and resumed its business of sending infected spam around the world, after lying dormant for four months. | Continue reading
A hacker has published a download link to the entire user database of Lumin PDF, totalling more than 24 million users, on a hacking forum. | Continue reading
Managing a startup involves a balancing act of the world's time zones in order to maximise online exposure. | Continue reading
The Australian Government has released its Data Sharing and Release Legislative Reforms Discussion Paper, in which it states its willingness to share its citizens' data without their consent. | Continue reading
Managing a startup from Down Under (Australia) involves a balancing act of the world's time zones in order to maximise online exposure. | Continue reading
One of the world's most infamous malware, Stuxnet, was delivered to its Iranian target in 2007 by a mole recruited by the Dutch intelligence agency, AIVD, while also working for the CIA and Mossad. | Continue reading
The US city of New Bedford, Massachusetts, rejected a ransom demand of $5.3 million and came back with a counter-offer of $400,000, while restoring encrypted data from backup. | Continue reading
The US city of New Bedford, Massachusetts, rejected a ransom demand of $5.3 million and came back with a counter-offer of $400,000, while restoring encrypted data from backup. | Continue reading
More than 47,000 Supermicro servers in 90 countries have new vulnerabilities called USBAnywhere in their baseboard management controllers, which can allow an attacker to connect to a server and mount any USB device of their choosing to the server remotely over any network includi … | Continue reading
More than 47,000 Supermicro servers in 90 countries have new vulnerabilities called USBAnywhere in their baseboard management controllers, which can allow an attacker to connect to a server and mount any USB device of their choosing to the server remotely over any network includi … | Continue reading
Security Audit - Enter your URL and see the latest vulnerabilities that match your stack. | Continue reading
Personal data has been published by equipment used by the Russian Government to spy on Internet traffic. Included was information from Sarov, a 'closed town' where Russia conducts secret nuclear research. | Continue reading
The French National Gendarmerie and FBI have joined forces to stop Retadup, a malicious worm that has infected at least 850,000 Windows machines throughout Latin America, by making the threat destroy itself. | Continue reading
The French National Gendarmerie and FBI have joined forces to stop Retadup, a malicious worm that has infected at least 850,000 Windows machines throughout Latin America, by making the threat destroy itself. | Continue reading
Medical systems built now are often three to four years away from market and will be in place for 10-15 years, so today's security technology will be 'old school' for 15-20 years. | Continue reading
A high-severity privilege escalation vulnerability - CVE-2019-6177 - has been discovered in Lenovo Solution Center software, where it could have been sitting for up to eight years. | Continue reading
A new survey shows that, among other things, nearly two thirds of registered US voters will not vote for candidates who approve of making ransomware payments. | Continue reading