Latest News


Android/Clicker.G malware found in Google Play apps

Researchers found a series of malicious apps containing Android/Clicker.G on the Google Play store. The campaign targets mobile devices in Russia, but they affect apps that are available globally.


Tech groups present 'Technology Sector Presidential Platform' to candidates

The leaders of a group of tech industry associations asked the presidential candidates to strengthen the United States' cybersecurity posture, and attached a "Technology Sector Presidential Platform" that lays out recommendations.


Hacker pranks 'stupid' Locky distributor, but ransomware threat keeps growing

A vigilante hacker turned the tables on a major Locky ransomware distributor, after hacking into its command and control server and swapping out the malicious payload with a script that contains the message "Stupid Locky."


Spearphishing attack nets $495K from investment firm

An employee at a Troy, Mich. Investment firm was tricked using a spearphishing attack into transferring almost $500,000 to a Hong Kong bank.


Lingering Android flaw exposes SMS

Android devices are vulnerable to attack owing to a newly discovered bug.

Data Breach Blog

Brunswick Corp.'s 13,000 workers' W-2 data compromised

Brunswick Corp. reported on May 3 that it was victimized by a spearsphishing scam that netted the W-2 information for possibly all 13,000 current and former company employees.

1,206 Solano Community College employees victimized in W-2 data breach

Solano Community College in Fairfield, Calif. was hit with a spearphishing attack led to the W-2 information for about 1,200 staffers being compromised.

LuckyPet data breach compromises online payment info

Seattle-based pet store LuckyPet notified the California State Attorney General's office of a data breach that compromised online customer information.

Featured News

Updated: Gmail, Yahoo email credentials among millions found on the dark web

Updated: Gmail, Yahoo email credentials among millions found on the dark web

Hold Security reported that one of its researchers discovered, and then acquired, a mega-size load of 272 million stolen email credentials from a hacker.

May issue now available!

The Threat Hunter Blog

Next up. A look at Locky Ransomware

Next up. A look at Locky Ransomware

We've been examining some of the newer - or, at least, most currently prevalent - strains of ransomware. This time we look at Locky.

May 2016 Product Reviews

AlienVault Unified Security Management Platform

Significant, mature next-generation blend of SIEM and UTM capabilities at a very reasonable price. Outstanding customer relationship building.

LogRhythm Security Intelligence Platform

Probably the most complete pure-play SIEM we’ve seen with the added benefit of many next-gen features and superlative correlation and analytics.

CorreLog SIEM Correlation Server

Excellent price point for a very flexible SIEM/log correlator with lots of features.


Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.


Sign up to our newsletters