GhostShell Comes Back to Life with New Data Dumps
The hackers in the GhostShell crew have published a list of 548 recently compromised targets.
Animal Farm Adds Dino Trojan to Menagerie
Dino, believed to be authored by a French intelligence agency, was used to spy on Iran.
CryptoWall 3.0 Attacks via Google Drive
The campaign makes use of a commercial exploit kit known as RIG, which will try to abuse vulnerabilities in JavaJRE, Adobe Reader, IE and Flash Player.
University Guidelines Aim at UK Cyberskills Shortage
If implemented, over 20,000 computer science graduates a year across 100 UK universities could be taught cybersecurity.
ICO Issued Over £1m in Fines in 2014/15
UK information commissioner launches annual report
Online Piracy Swindling IP-holders out of $800bn
Web piracy rises 22% as gaming industry hit hard
Organizations Lack Maturity in Monitoring and Logging – Report
CREST finds organizations lagging in their ability to spot and act on indicators of compromise
Trump Hotels Facing Likely Card Breach
A string of fraudulent debit and credit card charges at several property locations appears to extend back to at least February 2015.
5,000 New Mobile Malware Strains Appear Every Day
Banking trojans and other financial bugs make up a big chunk of the new strains: 50% of Android malware has a direct financial motivation.
Connected Devices Spark Digital Amnesia-And Insecurity
Most Americans use mobile phones as an extension of their brains—but aren't securing them.
Venafi Snags $39Mn for Crypto Funding
Intel Capital and other new investors led the round.
Fed Reserve: Chip and Signature Not Enough
Chip and signature is a half-measure, falling short of the chip and PIN technology deployed throughout the rest of the world.