Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam.
Stories by Lucian Constantin
A serious vulnerability in a popular Java library puts thousands of Java applications and servers at risk of remote code execution attacks.
Malware researchers from Bitdefender created a tool to recover files encrypted with a ransomware program called Linux.Encoder.1.
After targeting consumer and then business computers, ransomware authors are now going after Web servers.
A cyberespionage group with possible ties to the Iranian government has targeted over 1,600 defense officials, diplomats, researchers, human rights activists, journalists and other high-profile individuals around the world.
The U.S. National Institute of Standards and Technology (NIST) has published a guide to application whitelisting that explains the technology in detail and offers practical advice for how it should be used.
In addition to encrypting people's private files a new ransomware program dubbed Chimera threatens to publish those files on the Internet.
Researchers from mobile security firm Lookout have found over 20,000 samples of trojanized apps that root devices.
VBulletin Solutions has reset the passwords for over 340,000 accounts on its website following a security breach and released emergency security patches for its popular Internet forum software that's used on tens of thousands of websites.
Google's security researchers found 11 serious vulnerabilities in Samsung's Galaxy S6 Edge phone in code that was added by the manufacturer.
New security patches for Google's Nexus devices address seven vulnerabilities, two of which are critical and could allow for remote code execution when processing media files.
A software development kit created by Chinese Internet services company Baidu and used by thousands of Android applications contains a feature that gives attackers backdoor-like access to users' devices.
Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.
The Xen Project fixed several vulnerabilities in its popular virtualization software, including one that could allow potential attackers to break out of a virtual machine and gain control over the host system.
South Korean organizations are being targeted in attacks with a new stealthy backdoor program that gives attackers full access to infected computers.
- Project Coordinator ACT
- Business Analyst (Payment Systems Project) QLD
- Organisational Change Manager - Wealth Management NSW
- Trainer NSW
- Systems Administrator VIC
- Project Administrator- NSW
- Service Management Analyst (Part-Time) SA
- Test Analyst VIC
- Senior Project Manager / Program Manager NSW
- Business Analyst ( Finance/Banking) QLD