Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

jigsaw ransomware logo

Jigsaw crypto-ransomware deletes more files the longer you delay paying

A new ransomware program dubbed Jigsaw encrypts users' files and then begins to progressively delete them until the victim pays up the equivalent of $150 in Bitcoin cryptocurrency.

petya ransomware logo

Experts crack Petya ransomware, enable hard drive decryption for free

Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.

Digital Key, security, encryption

Wordpress turns on default encryption for hosted domains

Website hosting platform will automatically enable HTTPS for all the custom domain names that its users have associated with their websites.

Data analytics, big data, business, chart, laptop

Business email scams have led to $2.3 billion losses via rogue wire transfers

Over the past two and a half years, cybercriminals have managed to steal over $2.3 billion from thousands of companies worldwide by using email scams, the FBI reports.

Security online

Adobe patches actively exploited Flash Player vulnerability in 24 flaw fix

Adobe Systems released a security update for Flash Player to fix 24 critical vulnerabilities, including one that hackers have been exploiting to infect computers with ransomware over the past week.

20160224 stock mwc freeway cars traffic barcelona

Your car's computers might soon get malware protection

A start-up company called Karamba Security has developed malware prevention technology for the externally connected electronic control units (ECUs) found in cars.

security code big data cyberespionage DDoS

Massive application-layer attacks could defeat hybrid DDoS protection

Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and could spell trouble for website operators.

IPhone 6S launch in Palo Alto

Apple fixes iOS lock screen bypass that gives access to photos, contacts

Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos.

IBM logo

Three-year-old IBM patch for critical Java flaw is broken

Security researchers have found that a patch released by IBM three years ago for a critical vulnerability in its own Java implementation is ineffective and can be easily bypassed to exploit the flaw again.

150817 google marshmallow 03

Google fixes 39 Android flaws, some allow hackers to take over your phone

Google has released one of the largest Android monthly security updates, fixing a total of 39 vulnerabilities, 15 of which are rated critical.

Digital Key, security, encryption

HTTP compression continues to put encrypted communications at risk

Security researchers have expanded and improved the three-year-old BREACH attack that exploits the HTTP compression mechanism in order to recover sensitive information such as authentication cookies from encrypted Web traffic.

hid edge evo ehr40-k door controller

Flaw in popular door controllers allow hackers to easily unlock secure doors

A flaw in door controllers made by HID Global could allow hackers to unlock secure doors over the network without authentication.

Apple iPhone 5S (1)

Hackers can abuse the iOS mobile device management protocol to deliver malware

Researchers from Check Point Software Technologies found that the communication between MDM products and iOS devices is susceptible to man-in-the-middle attacks and can be hijacked to install malware on non-jailbroken devices.

online security

5 things you need to know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online.

generic image of a wi-fi router

Your router could succumb to a new Telnet worm

A new worm called Remaiten infects Linux-based embedded systems by exploiting weak Telnet passwords.