Security researchers have spotted two different online schemes that lead to pages hosting the FlashPack exploit kit.
Blackphone, the recently released security-oriented smartphone, has apparently been rooted.
During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather threat intelligence on all websites and mobile apps that are legitimately or illegally associated with their business.
Joshua Rogers, a teenage whitehat based in Australia, has found an extremely simple way to bypass PayPal's two-factor authentication feature.
The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations - outdated software, bad code, abandoned digital properties, or user errors - that contribute to the adversary’s ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption protocols, social engineering and “life event” spam.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.