Read full post The move follows a DHS review of federal government agencies’ steps to secure email and deploy authentication technologies.
Read full post Hundreds of millions of dollars stolen from banks via an sophisticated attack that blended cyber and physical elements.
Read full post Second time in four weeks FINSPY “lawful intercept” tool and a zero-day found together.
Read full post KRACK attacks work against networks using WPA and WPA2 encryption
Read full post No one is truly anonymous online, not even criminals.
Read full post If you’re just getting on the EU General Data Protection Regulation bandwagon, here’s where you should begin.
Read full post Vendors are reacting swiftly to a vulnerability which lets attackers eavesdrop on your network traffic.
Read full post As cybersecurity continues to become more of a mainstream concern, those of us who speak at industry events must learn how to truly connect with our audience.
Read full post We’ve gathered our own thoughts on the topics chosen each week for this short series of blogs that will be published twice a week. The post National Cybersecurity Awareness Month Twitter Chats appeared first on WeLiveSecurity
Read full post Three-quarters of the federal government uses encryption. Homeland Security says that isn’t enough.
Read full post The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is. The post DoubleLocker Android ransomware explained appeared first on WeLiveSecurity
Read full post ‘KRACK’ or Key Reinstallation AttaCK, as it has been labeled, means third parties could eavesdrop on a network meaning private conversations would no longer be private. The post WPA2 security issues pose serious Wi-Fi safety questions appeared...
Read full post Security experts have said the bug is a total breakdown of the WPA2 security protocol.
Read full post Combines Android ransomware with capability to change users device PINs.
Read full post Hackers gained “full and unfettered access” to a third-party holding restricted information
Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...
Read full post A security researcher said the tool, which is supposed to prevent SQL injections, could be easily bypassed.
Read full post Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.
Read full post DreamHost said the decision “will protect the constitutional rights of innocent internet users worldwide”
Read full post True, most malware isn’t viral any more, but I don’t think that matters in this context. Nor, of course, is the EICAR file a virus, and doesn’t in any respect behave like one. The post Product Testing:...
Read full post The malware, posing as popular adblocker Adblock Plus, made it past Google Web Store’s security checks
Read full post DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them – a combination that has not been seen previously in the Android ecosystem. The post DoubleLocker:...
Read full post The credit rating agency has pushed back on claims of a second cyberattack.
Read full post Your PC may be used to find cryptocurrency when you visit websites, with or without your consent.
Read full post The proverb “it never rains but that it pours” could have been written for Equifax – this time, malvertising.
Read full post It’s unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor’s network, security experts...
Read full post A coalition of federal law enforcement agencies, ISACs, and Symantec will offer BEC workshops in a dozen cities.
Read full post Embattled credit-monitoring company takes down help page that reportedly redirects users to download a bogus software update.
Read full post More businesses are switching to Office 365 despite fear of social engineering and ransomware attacks, but some remain wary.
Read full post Over the last year, a handful of cyberattacks have made news headlines and affected families. High-tech toy maker Spiral Toys was the victim of a particularly cunning hacking scheme. The maker of CloudPets stuffed animals reportedly exposed...
Read full post We take a look at the security concepts in the Mr Robot season 3 premiere.
Read full post With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.
Read full post The Chet Chat podcast is back – enjoy!