LATEST ARTICLES

COMODO THREAT RESEARCH LABS ALERT: Banking Trojan Gugi/Fanta/Lime Seeks System Privileges, User Credentials and...

It’s becoming a part of the landscape of our lives – regular reports of breaches and cybersecurity issues. There are reports that the average Internet user is so inundated with this...

US Presidential commission presents recommendations on cybersecurity

The US Commission on Enhancing National Cybersecurity, tasked by President Barack Obama, issued its final report with recommendations on cybersecurity. Cyber security is a primary issue in the agenda of many countries,...

Uber asks to track your location even when you’re not using the app

The last update for the Uber app raises great concerns because it asks to track users’ location even when they’ve been dropped off and exited the program. The last update of the...

SB16-340: Vulnerability Summary for the Week of November 28, 2016

apache -- hadoopIn Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges...

Experts from CloudFlare spotted a new dangerous botnet

Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai. Which is the most dreaded botnet in the current threat...

50 Million installations potentially impacted by AirDroid issues

At least 10 million Android users are exposed to cyber attacks due to multiple vulnerabilities affecting the popular AirDroid app. According to experts from the firm Zimperium, multiple vulnerabilities in the Android...

What Happens if you plug a USBKill in a gaming console or a car?

Ill-intentioned could destroy everything using the USBKill device, including gaming console, mobile devices, Google Pixel and also circuits in modern cars. Ill-intentioned could destroy everything using the USBKill device, including gaming console (Xbox...

Data on Europol terrorism investigations accidentally leaked online

According to a Dutch television program data on several investigations into the terrorism groups conducted by the Europol were accidentally leaked. According to Dutch television program Zembla, data on several investigations into...

A flaw allows to bypass the activation lock on iPhone and iPad

Researchers discovered a bug that can be exploited to bypass Apple’s Activation Lock feature and gain access to the homescreen of locked Apple devices. Security experts have discovered a new bug that...

Thousands of UK National Lottery player accounts compromised

Roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals, authorities are investigating the case. According to the operator Camelot, roughly 26,500 accounts of the UK National Lottery players...

Europol and other law enforcement agencies shut 4,500 websites peddling fake brands

In a massive crackdown, European police and law enforcement agencies worldwide seized more than 4,500 domains trading fake brands. The Europol conducted a massive crackdown against websites offering counterfeit products as part...