Read full post Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security’s decision to prohibit use of its products and services by the feds, the company says.
Read full post The smartphone manufacturer has sent an email to anyone who may have been affected in the breach.
Read full post The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google’s highest for an Android bug.
Read full post Some bug hunters make 16 times the median salary of software engineers in their home countries.
Read full post The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any questions? Just...
Read full post The company put a hold on payments through its site after fraud reports emerged.
Read full post While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
Read full post SophosLabs has published a technical report digging into the details of a not-so-super “Super Antivirus” charade on Google Play.
Read full post There’s something alarming about the world’s one billion regular Gmail users – barely any have turned on two-step verification.
Read full post Personal details of adult virtual reality game SinVR customers were accidentally exposed for two weeks, while security researchers tried to get the company’s attention
Read full post Sending an application letter to your prospective employer is a good idea, an extortion letter, not so much
Read full post Can the person squashed up against you on the train read your credit card without you realising? If so, what can you do about it?
Read full post Schneider Electric has revealed how the Trojan managed to disrupt core industrial systems in the Middle East.
Read full post It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these...
Read full post The Trojan is back with a new technique to avoid detection by email gateways.
Read full post “How to buy Bitcoin” dominated Google how-to searches in 2017, ranking third overall. With the hype surrounding cryptocurrency at a palpably all-time high, now is a better time than ever to cover the essentials of keeping cryptocurrencies...
Read full post Malwarebytes describes malicious extensions as ‘one of a kind’
Read full post Both the House and Senate reauthorized the controversial surveillance powers, without any meaningful debate, amendments, or privacy reforms.
Read full post Expert panel lays out potential risks for the 2018 election cycle and beyond
Read full post How a layered security strategy can minimize the threat and impact of a data breach.
Read full post The Golden State will be hit hardest but New York will lose the most money per incident.
Read full post The security flaw made the securities market an easy target and was only fixed after a security researcher sent more than half-a-dozen warning emails.
Read full post The creativity and intuition of your team members must be developed and nurtured.
Read full post New Mexico man pleads guilty to directing cyberattacks against his prior employers, business competitors, and law enforcement agencies.
Read full post ICS/SCADA vendor discloses in-depth analysis of a recent targeted attack against one of its customers.
Read full post How a Seattle travel company built a rock-solid mobile app without sacrificing performance or security.
Read full post Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere....
Read full post … and nobody bothered to vet the photo taken of that sticky note and distributed by AP.
Read full post The hackers tweeted out love for Turkish President Recep Tayyip Erdoğan: “We love turkish soldiers, we love Erdogan, we love Turkey.”
Read full post The bug bounty highlighted serious security issues in the Pixel smartphone.
Read full post Another site in the booming cryptocurrency wallet sector has been hacked after what looks like a simple DNS hijacking attack.
Read full post The depth of data collected from our online habits could easily allow profiles to be constructed, showing what may be considered extremely personal interests, drawing on information that we don’t realize someone is collecting. The post Trends...
Read full post The deal is designed to offer better security solutions for SMBs.
Read full post A man had admitted to disrupting domains belonging to former employers, competition, and law enforcement agencies.
Read full post The Android malware “SkyGoFree” pretends to be a security update, but it’s actually a powerful spyware and remote control tool.
Read full post
Read full post Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.
Read full post Serverless architectures take away business responsibility for server management, but security should still be top of mind.