Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

icarus drone hijacking

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology.

adobe flash player v10 icon

Emergency Flash Player patch fixes zero-day critical flaw

Adobe Systems released an emergency patch for Flash Player in order to fix a critical vulnerability that attackers are already taking advantage of.

security code big data cyberespionage DDoS

Attackers are now abusing exposed LDAP servers to amplify DDoS attacks

Attackers are abusing yet another widely used protocol in order to amplify distributed denial-of-service attacks: the Lightweight Directory Access Protocol (LDAP), which is used for directory services on corporate networks.

schneider electric modicon m340 plc

Workstation software flaw exposes industrial control systems to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations.

Security online

Critical account creation flaws patched in popular Joomla CMS

The Joomla developers are warning website administrators to apply an update for the popular content management system that fixes two critical vulnerabilities.

ransomware hardware security embedded circuit board integrated controller

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to fully compromise Android devices without exploiting any software vulnerability and instead taking advantage of a physical design weakness in RAM chips.

linux tux mascot logo

Easy-to-exploit rooting flaw puts Linux PCs at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to Linux based servers, desktops and other devices.

Security (3)

This free tool protects PCs from master boot record attacks

A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.

Security online

Intel CPU flaw could help attackers defeat security features

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.

20151027 oracle cloud on building

Oracle fixes 100s of vulnerabilities that put enterprise data at risk

Oracle has released another large batch of patches, fixing many critical vulnerabilities in enterprise products that are used to store and work with critical business data.

Digital Key, security, encryption

Critical flaws found in open-source encryption software VeraCrypt

A new security audit has found critical vulnerabilities in VeraCrypt, an open-source full-disk encryption program that's the direct successor to the widely popular, but now defunct, TrueCrypt.

malware payment terminal credit card

Hackers hide stolen payment-card data inside website product images

Attackers compromise online shops and store stolen payment-card details inside legitimate image files in order to avoid detection.

malware payment terminal credit card

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan onto the Internet and it bears striking similarities to Dyre, a malware threat believed to be dead for almost a year.

Digital Key, security, encryption

GlobalSign certificate revocation error leaves websites inaccessible

Many users around the world had trouble accessing some HTTPS websites due to an error at GlobalSign, one of the world's largest certificate authorities.

security code big data cyberespionage byte

Thousands of online stores compromised by credit-card theft

Almost 6,000 online shops have been compromised by hackers who added specially crafted code that intercepts and steals payment card details.