A new security audit has found critical vulnerabilities in VeraCrypt, an open-source full disk encryption program that's the direct successor of the widely popular, but now defunct, TrueCrypt.
Stories by Lucian Constantin
Cybercriminals have unleashed a new banking Trojan onto the Internet and it bears striking similarities to Dyre, a malware threat believed to be dead for almost a year.
Many users around the world had trouble accessing some HTTPS websites due to an error at GlobalSign, one of the world's largest certificate authorities.
Almost 6,000 online shops have been compromised by hackers who added specially crafted code that intercepts and steals payment card details.
Cisco Systems has patched a critical vulnerability that could allow attackers to gain access to Cisco Meeting Server deployments, which are used in enterprise environments for video and audio conferencing.
Researchers warn that many 1024-bit keys used to secure communications on the Internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.
The top management of StartCom and WoSign will be replaced and the two certificate authorities will undergo audits after browser vendors discovered that they mis-issued a number of digital certificates, violating industry rules.
In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers.
Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.
Following a Mozilla-led investigation that found multiple problems in the SSL certificate issuance process of WoSign, a China-based certificate authority, Apple will make modifications to the iOS and macOS to block future certificates issued by the company.
Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of files or complete system compromise.
The source code for a trojan that infected hundreds of thousands of internet-of-things devices and used them to launch distributed denial-of-service attacks was published online, paving the way for more such botnets.
Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for crypto-ransomware.
The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.
The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.
- Program Manager Banking NSW
- Security Delivery Manager l Security, Governance, Delivery & Operation NSW
- Sitecore .Net Developer NSW
- Site Acquisition Manager SA
- Senior Developer | Salesforce/Java NSW
- Senior Change Manager - Financial Services NSW
- Mid Level .Net Developer VIC
- Network Analyst NSW
- Program Business Change Director - HR Payroll NSW
- Change and Project Coordinator NSW