Lucian ConstantinReporter, IDG News Service, IDG News Service

Lucian Constantin writes about information security, privacy and data protection.

NAS boxes more vulnerable than routers, researcher finds

A security review found serious vulnerabilities in 10 popular NAS systems

Malware virus

Stealthy, tricky 'Poweliks' malware hides in your system registry - but not your hard drive

The malware is persistent across system reboots, despite not having any files on disk

PCWorld News

Cisco patches traffic snooping flaw in operating systems used by its networking gear

The vulnerability affects the OSPF routing protocol implementation on Cisco networking equipment

android malware

Android vulnerability still a threat to many devices nearly two years later

Many apps that use the Android addJavascriptInterface API are still vulnerable to JavaScript code injection, researchers from Bromium said

encryptitall

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A newly discovered ransomware threat runs as a batch file and uses the open-source GnuPG program for encryption

Most USB thumb drives can be reprogrammed to silently infect computers

The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said

freegames primary

Hacker group targets video game companies to steal source code

The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said

PCWorld News

Internet of things devices contain high number of vulnerabilities, study finds

Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices

antivirus security

Antivirus products riddled with security flaws, researcher says

Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims.

PCWorld News

Canada blames China for cyber intrusion at National Research Council

The attack was carried out by highly sophisticated state-sponsored hackers, the government of Canada said

android devil malware

Critical Android vulnerability lets malware compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said

PCWorld News

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed

darknet2 primary 100049630 gallery

Russian government offers huge reward for help unmasking anonymous Tor users

The Russian Ministry of Interior announced a contract for research on obtaining information about Tor users and their systems

hackers

50,000 sites hacked through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

PCWorld News

Hackers steal user data from the European Central Bank website, ask for money

The compromised information includes email addresses, phone numbers and physical contact addresses of ECB event participants