Banks: Credit Card Breach at P.F. Chang’s

Wednesday, June 11th, 2014

Nationwide chain P.F. Chang’s China Bistro said today that it is investigating claims of a data breach involving credit and debit card data reportedly stolen from restaurant locations nationwide. On June 9, thousands of newly-stolen credit and debit cards went up for sale on rescator[dot]so, an underground store best known for selling ...

It’s official: Malicious hackers have crappy password hygiene, too

Tuesday, June 10th, 2014

Given the amount of time malicious hackers spend bypassing other people's security, you might think that they pay close attention to locking down their own digital fortresses. It turns out that many of them don't, according to a recent blog post documenting some of their sloppiest password hygiene. The post comes ...

Malicious major website ads lead to ransomware

Friday, June 6th, 2014

Malicious advertisements on domains belonging to Disney, Facebook, The Guardian newspaper and others are leading people to malware that encrypts a computer's files until a ransom is paid, Cisco Systems has found. The finding comes shortly after technology companies and U.S. law enforcement banded together in a large operation to shut ...

New OpenSSL vulnerability puts encrypted communications at risk of spying

Friday, June 6th, 2014

A newly discovered vulnerability that allows spying on encrypted SSL/TLS communications has been identified and fixed in the widely used OpenSSL library. The vulnerability, which is being tracked as CVE-2014-0224, can be exploited to decrypt and modify SSL (Secure Sockets Layer) and TLS (Transport Layer Security) traffic between clients and servers ...

Experts Discover File-Encrypting Android Ransomware

Thursday, June 5th, 2014

Security vendor ESET claims to have discovered the first ever piece of file-encrypting Android ransomware, which has an associated C&C server hosted on a TOR domain to hide its location.The malware, detected by the vendor as 'Android/Simplocker', is most likely a work in progress as the implementation of the encryption ...