New research has shown that Wild Neutron, a hacker group otherwise known as Morpho, has been reaping havoc over the last 4 years with some of the biggest global corporations. @IT_SecGuru
Read moreNew research has shown that Wild Neutron, a hacker group otherwise known as Morpho, has been reaping havoc over the last 4 years with some of the biggest global corporations. @IT_SecGuru
Read moreCasinos in New Jersey were taken offline for 30 minutes and threatened with further disruption unless a bitcoin ransom is paid. More on this story and others at www.itsecurityguru.org @IT_SecGuru
Read moreHacking Team, providers of surveillance-ware, have seen 400GB of their source codes and data leaked online. For more on this story and others please visit www.itsecurityguru.com @IT_SecGuru
Read moreAttackers are reportedly carrying out DDoS attacks by using version one of the routing information protocol. More on this story and others at www.itsecurityguru.org @IT_SecGuru
Read moreRyan Ramminger, creator of an app called "Prized", has been fined $50,000 after the Federal Trade Commission revealed charges he had been using hidden malware within his app to "take control of the computing resources of consumers' mobile devices to mine for virtual currencies, such as Dogecoin, Litecoin and Quarkcoin." Customers were unaware of what was happening on their phones, however the terms of use of the app did specify that any code within it...
Read moreMiddle Eastern Respiratory Syndrome, or MERS, has claimed 32 lives in a recent outbreak. Hackers are reportedly exploiting peoples' health concerns via a spear phishing attack. Researchers at Trend Micro found that a Japanese mass media company was targeted by the scam, which says it has an attachment claiming to provide information about the prevention of MERS. In reality, it was delivering a backdoor program. The attachment came in the form of a CHM file,...
Read moreBernard Wagner, a researcher at MWR Labs, has reported flaws in the Fire phone that could allows apps to install certificates without interaction with users. The CertInstaller tool facilitates the installation of certificates in apps. But the flaws discovered by Wagner mean that apps which don't use certificate pinning are vulnerable to traffic interception. This in turn could lead to man-in-the-middle attacks. This kind of attack is used by attackers to secretly relay and possibly...
Read moreThe IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!
Our Address: 10 London Mews, London, W2 1HY
© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic
This site uses functional cookies and external scripts to improve your experience.
© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic
Privacy settings
Privacy Settings / PENDING
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
NOTE: These settings will only apply to the browser and device you are currently using.
GDPR Compliance