Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.
The Protect Your Election package from Google and Jigsaw includes password alert and two-step verification for candidates and campaigns.
RFTransceiver extension for the Metasploit Hardware Bridge API will let organizations detect and scan wireless devices operating outside 802.11 spec.
Webmasters should register on Search Console for hack notifications, advises the company.
The highly-effective malware targets Middle Eastern airlines, government, financial industries and critical infrastructures with a simple but powerful backdoor created by infected Excel files attached to phishing emails.
Vulnerability was discovered in WikiLeaks' recent data dump on CIA's secret cyber-offensive unit.
Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.