Don't-Miss Security Stories

trojan horse wooden

This mobile Trojan from China fills your phone with porn apps

Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan.

'Morpho' hackers pull off cyberpunk heists

DNC hacker Guccifer 2.0 denies Russian links and mocks security firms

The hacker who claims to have breached the Democratic National Committee’s networks is trying to beat back accusations that he’s linked with the Russian government.

120215 hacker

Time is short to stop expansion of FBI hacking, senator says

The U.S. Congress has a small window of time to stop proposed changes in federal court rules that will expand the FBI's authority to hack into computers during criminal investigations, a senator said Thursday.

security camera attack surveillance

Over 100 DDoS botnets built using Linux malware for embedded devices

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices.

mobile phones

Mobile ransomware use jumps, blocking access to phones

Mobile ransomware is on the rise, with the infection rate skyrocketing, according to new research.

security code big data cyberespionage byte

Terror-suspect database used by banks, governments, has been leaked

A database described by some as a “terrorism blacklist” has fallen into the hands of a white-hat hacker who may decide to leak it online.

spying eye cyberespionage surveillance

Researchers dismantle decade-long Iranian cyberespionage operation

The infrastructure used by an Iranian cyberespionage group to control infected computers has been hijacked by security researchers.

Legislation of privacy security keyboard law legal gavel

ACLU lawsuit challenges US computer hacking law

The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking crimes law, with the civil liberties group saying the law inhibits research about online discrimination.

symantec logo

Nasty flaws in Symantec security tools expose millions of computers to hacking

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.

160628 hdd hard disk drive hitachi stock 3

Used hard drives on eBay, Craigslist are often still ripe with leftover data

Before you throw away that old hard drive, make sure you purge the memory clean. A new study has found that most users are accidentally giving up photos, social security numbers and financial data, by failing to properly delete the files on their recycled hard drives.

WhatsApp (1)

This malware pretends to be WhatsApp, Uber and Google Play

Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play.

spying eye cyberespionage surveillance

Senator stalls intelligence funding bill over surveillance concerns

A U.S. senator has stalled an intelligence budget bill over concerns that it would expand surveillance while limiting oversight of it.

security code big data cyberespionage DDoS

Thousands of hacked CCTV devices used in DDoS attacks

Attackers have compromised more than 25,000 digital video recorders and CCTV cameras and are using them to launch distributed denial-of-service (DDoS) attacks against websites.

spying eye cyberespionage surveillance

FBI expansion of surveillance powers meets obstacle

A move in the Senate to provide enhanced surveillance powers to the FBI through the use of National Security Letters met a hurdle Monday after Senator Ron Wyden placed a hold on the 2017 Intelligence Authorization bill over the controversial provisions.

A hacker wants to sell 10 million patient records on the black market

A hacker claims to have stolen close to 10 million patient records and is selling them for about $820,000.