Don't-Miss Security Stories

android devil malware

'Coinkrypt' malware mines Litecoin, Dogecoin on Android

But the simple malware is likely to run a battery down, or worse, cause a phone to overheat

PCWorld News

Hosting company describes security scare aimed at Bitcoin accounts

Attackers intercepted password-reset emails by manipulating Chunk Host's third-party email service

security 100026749 gallery

Full Disclosure security mailing list reborn under new management

Nmap creator sets up a replacement for the recently closed Full Disclosure security mailing list.

monster

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said.

PCWorld News

Security vendor Trustwave named in Target-related suit

Trustwave should have detected and prevent the attacks, the suit claims

Bitcoin's backers know they need to win you over

New applications are needed for wider acceptance, investors recently said.

snowden

Petitions call on U.S. government to leave Snowden alone

Advocates plan to present two petitions to the DOJ and the State Department.

French consumer group: Google, Facebook privacy policies are too hard to read

In a civil action, UFC-Que Choisir is asking the three social networks to make their user agreements clearer and fairer

bitcoin

Ransomware that demands Bitcoins is distributed by malware that steals bitcoins

Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied

Just previewing email can give attackers control of your PC, Microsoft warns

Poisoned RTF files can give hackers full control of your machine - even if you only preview the document in Outlook.

Text message command makes infected ATMs spew cash

The malware can cause a cash machine to start churning out bills

tumblrhero

How to use Tumblr's new two-factor authentication

Tumblr joins a large number of online services that are making it harder for hackers to break into your account thanks to two-factor authentication.

on techhive.com

Report: Obama to unveil legislation to end NSA bulk phone data collection

Phone data will now be stored with telecommunications carriers rather than with the U.S. National Security Agency

cyber security

Rogue apps could exploit Android vulnerability to brick devices, researchers warn

The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said.

basecamplogo

Basecamp falls to blackmail-fueled denial of service attack

Your data is safe - you just can't access it.