Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

20151027 openworld oracle cloud signs

Oracle releases 136 security patches for wide range of products

Oracle's latest quarterly security update contains 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle Sun Products, Java and MySQL.

OS X El Capitan installation

Outdated Git version in OS X puts developers at risk

The OS X command line developer tools include an old version of the Git source code management system that exposes Mac users to remote code execution attacks.

xx

Hacker: This is how I broke into Hacking Team

The hacker who leaked 400GB of internal files and emails from Italian surveillance software maker Hacking Team published a full account of how he infiltrated the company's network.

security hacker

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 U.S. and Canadian banks.

Digital Key, security, encryption

Ransomware authors use the bitcoin blockchain to deliver encryption keys

Ransomware authors are using the bitcoin blockchain, which serves as the cryptocurrency's public transaction ledger, to deliver encryption keys to users.

microsoft sculpt ergonomic mouse

Optional Windows update protects Microsoft wireless mice against hijacking

Microsoft issued an optional update to protect Windows computers against an attack that could hijack wireless mice to execute malicious commands.

iPhone 5c

FBI reportedly bought exploit from hackers to access San Bernardino iPhone

The FBI reportedly paid professional hackers a one-time fee for a previously unknown vulnerability that allowed the agency to unlock the iPhone of San Bernardino shooter Syed Farook.

Badlock vulnerability logo

Hyped-up Microsoft, Samba "Badlock" flaw isn't critical, but serious enough

Microsoft and the Samba project fixed a vulnerability in their implementation of the SMB/CIFS protocol after the flaw was initially announced three weeks ago under the name Badlock.

jigsaw ransomware logo

Jigsaw crypto-ransomware deletes more files the longer you delay paying

A new ransomware program dubbed Jigsaw encrypts users' files and then begins to progressively delete them until the victim pays up the equivalent of $150 in Bitcoin cryptocurrency.

petya ransomware logo

Experts crack Petya ransomware, enable hard drive decryption for free

Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.

Digital Key, security, encryption

Wordpress turns on default encryption for hosted domains

Website hosting platform Wordpress.com will automatically enable HTTPS for all the custom domain names that its users have associated with their websites.

Data analytics, big data, business, chart, laptop

Business email scams have led to $2.3 billion losses via rogue wire transfers

Over the past two and a half years, cybercriminals have managed to steal over $2.3 billion from thousands of companies worldwide by using email scams, the FBI reports.

Security online

Adobe patches actively exploited Flash Player vulnerability in 24 flaw fix

Adobe Systems released a security update for Flash Player to fix 24 critical vulnerabilities, including one that hackers have been exploiting to infect computers with ransomware over the past week.

20160224 stock mwc freeway cars traffic barcelona

Your car's computers might soon get malware protection

A start-up company called Karamba Security has developed malware prevention technology for the externally connected electronic control units (ECUs) found in cars.

security code big data cyberespionage DDoS

Massive application-layer attacks could defeat hybrid DDoS protection

Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and could spell trouble for website operators.