Written By Shane Schick

Researchers Show Danger of DNA Data Paired With Malware-Infected Strand

Researchers found an often overlooked vulnerability in DNA data. While uncommon, malicious code injection into synthetic DNA could be a credible threat.

GitPwnd Shows How Threat Actors Could Hijack Git Repositories in Software Development

Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.

TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module

Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.

What Adobe’s Decision to Phase Out Flash Player Means for Online Security

Adobe announced that it will stop supporting its Flash Player by 2020, but the company pledged to continue offering security patches for the next few years

Splash Screens Elicit Scares, According to New Ransomware Study

A new ransomware study found that splash screens are being used to manipulate users through social engineering and scare tactics.

More Than 500,000 Systems Infected by Stantinko Malware Since 2012

Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.

Google Adds Verification Screens for Plugins Following Phishing Attacks

Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.

GhostCtrl Android RAT Demonstrates Spooky Range of Capabilities

Security researchers recently uncovered a scary version of GhostCtrl, an Android RAT with advanced capabilities that can be very difficult to detect.

New Malware Gets Stronger by Using Real Apps in Banking Attacks

New malware is infiltrating bona fide apps, making banking Trojans harder to detect. Fortunately, it can be shut down if it is detected in time.

Black Hat Attendees Predict Cyberattack on US Infrastructure Within Two Years

Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.