Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

security code big data cyberespionage DDoS

Bangladesh Bank attackers used custom malware that hijacked SWIFT software

The hackers who stole $81 million from Bangladesh's central bank earlier this year likely used custom malware designed to interfere with the SWIFT client software used by financial institutions.

151027 facebook headquarters 1

Facebook bug hunter stumbles on backdoor left by hackers

A researcher found a PHP-based backdoor installed by hackers on one of Facebook's corporate servers.

20151005 Cisco headquarters sign

Cisco fixes serious denial-of-service flaws in wireless LAN controllers, other products

Cisco Systems has released patches to fix serious denial-of-service flaws in its Wireless LAN Controller (WLC) software, Cisco Adaptive Security Appliance (ASA) software and the Secure Real-Time Transport Protocol (SRTP) library that's used in many products.

ransomwhere logo

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.

malware payment terminal credit card

New point-of-sale malware Multigrain steals card data over DNS

A new memory scraping malware program steals payment card data from point-of-sale (PoS) terminals and sends it back to attackers using the Domain Name System (DNS).

20151027 openworld oracle cloud signs

Oracle releases 136 security patches for wide range of products

Oracle's latest quarterly security update contains 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle Sun Products, Java and MySQL.

OS X El Capitan installation

Outdated Git version in OS X puts developers at risk

The OS X command line developer tools include an old version of the Git source code management system that exposes Mac users to remote code execution attacks.


Hacker: This is how I broke into Hacking Team

The hacker who leaked 400GB of internal files and emails from Italian surveillance software maker Hacking Team published a full account of how he infiltrated the company's network.

security hacker privacy

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 U.S. and Canadian banks.

Digital Key, security, encryption

Ransomware authors use the bitcoin blockchain to deliver encryption keys

Ransomware authors are using the bitcoin blockchain, which serves as the cryptocurrency's public transaction ledger, to deliver encryption keys to users.

microsoft sculpt ergonomic mouse

Optional Windows update protects Microsoft wireless mice against hijacking

Microsoft issued an optional update to protect Windows computers against an attack that could hijack wireless mice to execute malicious commands.

iPhone 5c

FBI reportedly bought exploit from hackers to access San Bernardino iPhone

The FBI reportedly paid professional hackers a one-time fee for a previously unknown vulnerability that allowed the agency to unlock the iPhone of San Bernardino shooter Syed Farook.

Badlock vulnerability logo

Hyped-up Microsoft, Samba "Badlock" flaw isn't critical, but serious enough

Microsoft and the Samba project fixed a vulnerability in their implementation of the SMB/CIFS protocol after the flaw was initially announced three weeks ago under the name Badlock.

jigsaw ransomware logo

Jigsaw crypto-ransomware deletes more files the longer you delay paying

A new ransomware program dubbed Jigsaw encrypts users' files and then begins to progressively delete them until the victim pays up the equivalent of $150 in Bitcoin cryptocurrency.

petya ransomware logo

Experts crack Petya ransomware, enable hard drive decryption for free

Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.