An Android adware named RottenSys has reportedly affected nearly 5 million Android devices since 2016, with the capability to turn affected devices into becoming part of a botnet.
Security researchers uncovered a traffic distribution system (TDS) being advertised as a service in the dark web. Named “BlackTDS,” the TDS is used to deploy malware and redirect would-be victims to exploit kits.
A new research demonstrated a proof-of-concept attack they named “Mosquito,” which can exfiltrate data from online and air-gapped computers using speakers and headphones.
MIT's recent research delved into 126,000 stories tweeted by around 3 million accounts from 2006 to 2017 and found that fake news spread faster and were more likely to be retweeted than true stories.
Researchers found US-based traffic systems vulnerable to data spoofing attacks, where smart intersections are tricked into indirectly causing traffic slowdowns.
The EU General Data Protection Regulation (GDPR) is weeks away. A Google paper on the right to be forgotten highlights challenges to GDPR compliance, particularly the right to erasure. What are the the implications for organizations?
A lot of best practices teach users how to prevent or defend against phishing attacks, but how can organizations actively detect and thwart them before users even see them?
A new Mirai variant dubbed as OMG was found targeting IoT devices and can turn them into proxy servers, aside from Mirai’s original denial-of-service attack capabilities.
Vulnerabilities in Facebook’s Account Kit and how it's implemented by Tinder can potentially let hackers take over Tinder accounts using only the victim’s phone number. How can DevOps figure in the equation?