Security News

  • The Next Web
  • The Hackers News
  • Naked Security
  • HelpNet Security
  • NIST
  • Security Week
  • Threat Post
  • Security Week
  • Security Affairs
  • IT World Canada
  • Fire Eye
  • Tech Channel


Under former CEO Marissa Mayer, Yahoo failed to build anything truly exciting over the past five yea [...]

In order for electric vehicles to go mainstream, it’ll take more than just people buying them: gover [...]

Ad-related fraud is a very real problem that has been puzzling everyone in the industry from small b [...]

In post-dot com era Silicon Valley, Zuckerberg was the poster child for all things bro culture. The [...]

In its continuing divergence from its original form as an auction site, eBay now offers price-matchi [...]

Last month, Pokémon GO developer Niantic decided to deal with cheaters by trolling them with extreme [...]

A 1000 person survey on issues relating to privacy has revealed that smart devices pose too much ris [...]

Everything old is new again. Old, in this case, is the NES classic that introduced many of us to gam [...]

If you’re a Virgin Mobile USA subscriber and are looking to upgrade to the latest and greatest Andro [...]

With July 4th coming up, you’ll want to make sure you can eke the best out of your phone’s camera fo [...]

WebSites Found Collecting Data from Online Forms Even Before You Click Submit'Do I really need to give this website so much about me?' That's exactly what I usual [...]

NSA Opens Github Account — Lists 32 Projects Developed by the AgencyThe National Security Agency (NSA) — the United States intelligence agency which is known for its se [...]

Next Windows 10 Version May Have Built-in EMET Anti-Exploit ProgramIt seems Microsoft is planning to build its EMET anti-exploit tool into the kernel of Windows 10 Cre [...]

Microsoft to Remove SMBv1 Protocol in Next Windows 10 Version (RedStone 3)The Server Message Block version 1 (SMBv1) — a 30-year-old file sharing protocol which came to light [...]

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug DiscoveredSecurity researchers have discovered more than a decade-old vulnerability in several Unix-based oper [...]

Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files BackSouth Korean web hosting provider has agreed to pay $1 million in bitcoins to hackers after a Linux [...]

Database of Over 198 Million U.S. Voters Left Exposed On Unsecured ServerInformation on more than 198 Million United States citizens, that's over 60% of the US populati [...]

Mexican Govt. Allegedly Used Spyware Against Journalists, Activists & A ChildAfter the disclosure of sophisticated global espionage and disinformation campaign aimed to discredi [...]

European Parliament Proposes Ban On Encryption BackdoorsPrime Minister Theresa May wants tech companies, like Facebook, Apple, and Google, to create controv [...]

How to Speed Up Firefox With Multi-Process, If It's Not Working By DefaultAfter years of waiting, Mozilla last week launched Firefox 54 for Windows, Mac, Linux, and Android, [...]

New Fileless Ransomware with Code Injection Ability Detected in the WildIt is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, an [...]

25-Year-Old Hacker Pleads Guilty to Hacking U.S. Military Satellite Phone SystemA British computer hacker who allegedly hacked a United States Department of Defense satellite syste [...]

Wikileaks Unveils 'Cherry Blossom' — Wireless Hacking System Used by CIAWikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – w [...]

Become A Certified Hacker – 5 Online Learning Courses for BeginnersHacking is not a trivial process, but it does not take too long to learn. If you want to learn Ethic [...]

Google's New Tool Lets You Easily Backup & Sync Your Entire PC to the CloudSoon you will be able to auto backup and sync your whole computer on Google Drive. Yes, you heard th [...]

Jaff Ransomware Decryption Tool Released – Don't Pay, Unlock Files for FreeHit by Jaff Ransomware? Don't pay the Ransom. You can unlock your files for Free! Kaspersky Lab [...]

ISPs Should Block ‘The Pirate Bay’ Torrent Site: Top European Court RulesThe Pirate Bay — a widely popular file-sharing website predominantly used to share copyrighted mater [...]

US Warns of 'DeltaCharlie' – A North Korean DDoS Botnet MalwareThe United States government has released a rare alert about an ongoing, eight-year-long North Korea [...]

Microsoft Issues Updates for 96 Vulnerabilities You Need to Patch this MonthAs part of June's Patch Tuesday, Microsoft has released security patches for a total of 96 secu [...]

Microsoft Releases Patches for 3 Remaining NSA Windows ExploitsDid you know… last month's widespread WannaCry ransomware attack forced Microsoft to release se [...]

Scammers Are Using Fake Apple In-App Subscriptions to Make Lot of MoneyIn this year's annual event, Apple announced that the company had paid out $70 Billion to devel [...]

Beware! Over 800 Android Apps on Google Play Store Contain 'Xavier' MalwareOver 800 different Android apps that have been downloaded millions of times from Google Play Store f [...]

Dangerous Malware Discovered that Can Take Down Electric Power GridsLast December, a cyber attack on Ukrainian Electric power grid caused the power outage in the northe [...]

Online Training for Cisco CCNA, CCNP Certification ExamsAs governments and enterprises migrate toward controller-based architectures, the role of a core net [...]

French Police Seize 6 Tor Relay Servers in WannaCry InvestigationWannaCry, the biggest ransomware attack in the history, gained prominence very rapidly in the media [...]

Commercial spyware unleashed against Mexican political activistsThe software company says it vets governments' human rights records before selling its software [...]

GDPR: how to avoid the data protection cowboysAs we keep reminding you, GDPR is now less than a year away. Here are our tips to help you pick the [...]

New malware uses old trick – and is a reminder to disable UPnPHijacking UPnP is rare, but it's a straightforward trick that will be copied soon enough [...]

Supreme Court: sex offenders can’t be banned from social mediaBanning sex offenders from social media violates fundamental First Amendment rights, rules judge [...]

When does security turn into snooping? [Security SOS Week]Sign up for today's live Security SOS podcast, or catch up on earlier episodes you missed. [...]

NSA failed to implement security measures, says damning reportThe NSA's post-Snowden 'Secure the Net' initiative has done nothing of the sort, says [...]

Stack Clash Linux vulnerability: you need to patch nowIf you're running Linux-based IoT devices, remember that attackers are particularly focusing on [...]

How social media companies are using AI to fight terrorist contentFacebook, Google and other providers are stepping up with techniques ranging from AI detection to hu [...]

Consumer products companies, retailers and restaurant businesses may be operating with a false sense [...]

If often happens to less prominent individuals, but this time it happened to a US State Supreme Cour [...]

If US citizens weren’t convinced by now that they have long lost control of their data, the fact is [...]

Less than a year since the release of Firefox Focus for iOS, Mozilla has ported the privacy-focused [...]

The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. [...]

OTA’s ninth annual Online Trust Audit & Honor Roll analyzed more than 1,000 consumer-facing webs [...]

Businesses that successfully apply artificial intelligence (AI) could increase profitability by an a [...]

Trustwave released the 2017 Trustwave Global Security Report which reveals the top cybercrime, data [...]

Qualys researchers have unearthed a serious privilege escalation bug affecting a wide variety of Uni [...]

Whether through ransomware, or simply by breaking into computer systems and exfiltrating and deletin [...]

This publication approves the XTS-AES mode of the AES algorithm for data on storage devices. [...]

Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cyc [...]

Researchers at the Black Hat security conference on Thursday showed an iPhone security flaw which ex [...]

The Mozilla Firefox browser experiences it`s first ever Zeroday exploit. (Fixed) [...]

FoxNews is reporting that a Hacker is attempting extort $10 million from the State of Virginia [...]

So many people have asked for our help with infected computers that we put together this review of f [...]

Conflicker updates its self to include a keylogger and tools to find passwords and finanacial data. [...]

The "Conflicker" worm is set to trigger on April 1st. We provide the basic links you need [...]

NOD32 virus version 3918 is quarantining important Windows files [...]

Cost of Data Breach Drops Globally, But Rises 5% in U.S. read more [...]

After making it available for iOS devices in November 2016, Mozilla this week brought its privacy-fo [...]

Redwood City, Calif.-based Elastic Beam emerged from stealth mode on Wednesday with the launch of a [...]

We have a major shortage of qualified cybersecurity professionals. This is not a new realization and [...]

Boston, MA-based Cybereason today announced that it has raised $100 million in Series D funding from [...]

Cost of Malvertising is Minimal; Price of Zero-days is Rising, Researchers Say read more [...]

Palestinian law enforcement agencies and other targets within Palestine were targeted in a spear phi [...]

Many OT Networks are Susceptible to Threats Like WannaCry read more [...]

Cisco’s Talos intelligence and research group announced on Monday the availability of a new open sou [...]

Situational awareness is critical in every kind of engagement. The internet is no exception. Effecti [...]

Banking Trojan TrickBot is no longer hitting only banks and financial institutions, but also added p [...]

Newly discovered vulnerabilities affecting DVR systems could open the door to new, more potent Inter [...]

ShieldX Networks Emerges From Stealth Mode With New Product to Protect Cloud Infrastructure read mor [...]

Arbor Networks has used the IP addresses shared recently by United States authorities to analyze dis [...]

Microsoft said Wednesday it would extend its Edge bug bounty program indefinitely. [...]

Former AT&T CSO, Ed Amoroso, says government needs to shift from talk to action when it comes to [...]

Carmaker Honda announced Wednesday that it was forced to shut down production at one of its Japanese [...]

OpenVPN patched four vulnerabilities privately disclosed by Dutch researcher Guido Vranken, includin [...]

Avaya released a patch last week for a remote code execution vulnerability in its Avaya Aura Applica [...]

Router manufacturer TP-Link recently fixed a vulnerability in a discontinued line of routers that if [...]

Researchers find flaws in an internet-connected drill, but say minimal, hard-to-find bugs indicate t [...]

Proofpoint has connected the University College London ransomware to Mole, spread by AdGholas malver [...]

Encrypted email service ProtonMail announced it was launching its own VPN, ProtonVPN, on Tuesday. [...]

Google removed two apps, Magic Browser, and Noise Detector, that were vehicles for the Ztorg Trojan, [...]

Cost of Data Breach Drops Globally, But Rises 5% in U.S. read more [...]

After making it available for iOS devices in November 2016, Mozilla this week brought its privacy-fo [...]

Redwood City, Calif.-based Elastic Beam emerged from stealth mode on Wednesday with the launch of a [...]

We have a major shortage of qualified cybersecurity professionals. This is not a new realization and [...]

Boston, MA-based Cybereason today announced that it has raised $100 million in Series D funding from [...]

Cost of Malvertising is Minimal; Price of Zero-days is Rising, Researchers Say read more [...]

Palestinian law enforcement agencies and other targets within Palestine were targeted in a spear phi [...]

Many OT Networks are Susceptible to Threats Like WannaCry read more [...]

Cisco’s Talos intelligence and research group announced on Monday the availability of a new open sou [...]

Situational awareness is critical in every kind of engagement. The internet is no exception. Effecti [...]

Banking Trojan TrickBot is no longer hitting only banks and financial institutions, but also added p [...]

Newly discovered vulnerabilities affecting DVR systems could open the door to new, more potent Inter [...]

ShieldX Networks Emerges From Stealth Mode With New Product to Protect Cloud Infrastructure read mor [...]

Arbor Networks has used the IP addresses shared recently by United States authorities to analyze dis [...]

The Honda company shuts down a factory in Japan after finding the WannaCry ransomware in its network [...]

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a [...]

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out o [...]

It is official, the National Security Agency (NSA) has presented its GitHub page that includes 32 pr [...]

South Korean web hosting company NAYANA was hit by the Erebus ransomware that infected 153 Linux ser [...]

Cisco Talos intelligence group released an open source framework named BASS that is designed for aut [...]

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that c [...]

Threat actors behind the financial trojan TrickBot have been updating its campaigns targeting Paymen [...]

Journalists and activists in Mexico accused the government of spying on them with the powerful surve [...]

Stack Clash is a local privilege escalation flaw in Linux, BSD, Solaris and other open source system [...]

After four years, AMD is back in the data centre chip space, and the company is looking pry open the [...]

The CIO is now a source of competitive edge for those enterprises that invest in understanding and a [...]

The new head of VMware Canada has new ideas about how to grow the virtualization firm's busines [...]

Smartphones probably aren't the first thing you think of when the power tool aficionado Dewalt [...]

Data used to just a business bi-product, something that happened incidentally in the course of the d [...]

The age of digital disruption is here, and while not too long ago companies were unsure of how they [...]

It’s been widely reported that the Canadian technology sector is experiencing – and will continue ex [...]

Swing into Action ITWC wants to send you and a friend in style to watch the world’s top golfers comp [...]

In its annual look at data from customer devices Trustwave has some telling numbers [...]

Google Home's launch in Canada will feature French language support, but not quite all the serv [...]

Google is cutting out the middle man when it comes to job hunting with its new jobs search engine. [...]

Rami Sayar is a technical evangelist at Microsoft Canada and is passionate about the intersection of [...]

Amazon Web Services says it's adding another 200 jobs in Toronto, with the official opening of [...]

New legislation revealed today to create appointed body to for the first time oversee all security a [...]

The third annual study funded by IBM shows 27 Canadian organizations lost an average of $5.78 millio [...]

BuildDirect.com sails through Online Trust Alliance's privacy audit. Read how your site can mee [...]

Just as the Internet of Things (IoT) is transforming how we live, the Enterprise of Things (EoT) is [...]

On June 6, the Municipal Information Systems Association of Ontario (MISA) announced the 2017 winner [...]

In a world where security breaches and cyber attacks have increased in recent years, businesses are [...]

In this pilot episode of ITWC podcast Silicon Valley North, associate editor Eric Emin Wood discusse [...]

Multiple hactivist groups most likely to try to disrupt next federal election, says CSE [...]

CanadianCIO of the Year is the premier technology executive recognition program in Canada. We are lo [...]

FireEye has identified a threat actor it calls FIN10 which has been attacking Canadian firms since a [...]

Digital transformation is the “next big thing” right now. Most C-suite execs have either taken their [...]

After months of searching, Toronto has finally appointed its first Chief Resilience Officer. [...]

Introduction The following blog discusses a couple of common techniques that malware uses to obscure [...]

FireEye has identified a set of financially motivated intrusion operations being carried out by a th [...]

In this blog, we will take a closer look at the powerful, versatile backdoor known as CARBANAK (aka [...]

Summary In May and June 2017, FireEye observed a phishing campaign targeting at least seven global l [...]

The “EternalBlue” exploit (MS017-010) was initially used by WannaCry ransomware and Adylkuzz cryptoc [...]

Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of [...]

WannaCry (also known as WCry or WanaCryptor) malware is a self-propagating (worm-like) ransomware th [...]

Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intr [...]

In 2015, FireEye published details about two attacks exploiting vulnerabilities in Encapsulated Post [...]

Dridex and Locky, two prolific malware families that made waves in 2016 after being distributed in s [...]

In 2017, Mandiant responded to multiple incidents we attribute to FIN7, a financially motivated thre [...]

Five years ago, Mandiant released a proof of concept tool named ShimCacheParser, along with a blog p [...]

FIN7 is a financially-motivated threat group that has been associated with malicious operations dati [...]

In this post we are going to take a quick look at what it takes to write a libemu compatibility laye [...]

FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to downl [...]

Industrial enterprises such as electric utilities, petroleum companies, and manufacturing organizati [...]

FireEye recently detected malicious Microsoft Office RTF documents that leverage CVE-2017-0199, a pr [...]

FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisc [...]

APT10 Background APT10 (MenuPass Group) is a Chinese cyber espionage group that FireEye has tracked [...]

Mandiant has observed APT29 using a stealthy backdoor that we call POSHSPY. POSHSPY leverages two of [...]

As a malware analyst or systems programmer, having a suite of solid dynamic analysis tools is vital [...]

Mandiant has observed Russian nation-state attackers APT29 employing domain fronting techniques for [...]

Just over one year ago (November 2015), I released WMIOps, a PowerShell script that enables a user t [...]

Malvertising occurs when an online advertising network knowingly or unknowingly serves up malicious [...]

Every year Mandiant responds to a large number of cyber attacks, and 2016 was no exception. For our [...]

Episode #251 - Sambacry Update, RIG Exploit Kit, Malware Samples and Internet Weather [...]

Episode #250 - Adware, Malware in PPT files, and Security Deficiencies in Medical Devices [...]

Episode #249 - A Bug in Samba, Bugs in Subtitles and Internet Weather [...]

Episode #248 - Hacked Android Phones, Anti-virus for cars, a new worm and the John Markley Quiz [...]

Episode #247 - Battle of the Botnets, the James Bond of Botnets and Internet Weather [...]

Episode #246 - Business Email Compromise, Orange is the New Black Hack, and Certificate Pinning [...]

Episode #245 - Employee leaks, Intel Vulnerability and the Internet Weather [...]

Episode #244 - Stranger Vectors, Security Building Blocks and the John Markley Quiz. [...]

Episode #243 - Threat Hunting, a new Phishing Scam and Internet Weather [...]

Episode #242 - BrickerBot malware, Robocalling and Internet Weather [...]

Episode #241 - Fileless malware, retaining security ninjas, the world's biggest robots and [...]

Episode #240 - Android Security 2016 Year in Review, Adware Apps Booted from Google Play and Interne [...]

Episode #239 - Establishing Baselines for Your Network and AT&T ThreatTraq Decrypted - Botnet Ac [...]

Episode #238 - Zero-day Exploits, Javascript Libraries and the Internet Weather Report. [...]

Episode #237 - Spammers Expose Operation, Operation "Bugdrop", Backdoor in DBLTek and the [...]

Episode #236 - Sha-1 Cracked, Akamai's State of the Internet Report, and the Internet Weath [...]

AT&T Data Security analysts discuss Java and Python Bugs, Explosion of Ransomware, ASLR-busting [...]

AT&T Data Security analysts discuss slot machine hacking, Ticketbleed, hacking printers, and the [...]

AT&T Data Security analysts discuss PDF-based phishing, beating captchas, and attacks on Hadoop [...]

AT&T Data Security analysts discuss Android VPN problems, DVR passwords exposed, router vulnerab [...]

AT&T Data Security analysts discuss insecure passwords, credential stuffing, and app stores in C [...]

AT&T Data Security analysts discuss Gmail phishing, Microsoft security updates, Whatsapp, and th [...]

AT&T Data Security analysts discuss malware trends, Grizzly Steppe, DDoS Defense with BGP Flowsp [...]

AT&T Data Security analysts discuss Popcorn TIme Ransomware, KillDisk Ransomware, Android Malwar [...]

AT&T Data Security analysts talk about their security forecasts for 2017. [...]