Miner found inside free and pirated software
Let’s say someone wants to post their holiday videos to show friends.…
Future cars: A report from the Frankfurt motor show
If you’d like to know what cars will look like in the…
Attacks on enterprise security: Microsoft services as a weapon
Hackers have gone big with the exploitation of legitimate software. Several reports…
How to decrypt files encrypted by the Shade ransomware
Last year, we joined forces with Dutch law enforcement to launch the…
Looking through Big Brother’s eyes
iPower, a company behind a cloud storage service for government agencies, was…
BadWinmail: How your PC can be infected with just one email you didn’t actually open
We’ve told you this time and time again: never click suspicious links,…
Security Week 32: Android Stagefright, new car hacks, Do Not Track 2.0 and more
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed…
Security Week 34: new unpatched vulnerabilities in Android, Mac OS X, Schneider Electric SCADA and more
What a dreadful week this one has been for the infosec industry,…
Security Week 37: Bug-bugzilla, Carbanak is back, and С&C gone fishing
In the new installment of our explosive hit series “Infosec news”: The…