Read full post The number of command-and-control listings increase 32% in 2017, with more botnet controllers hosted in the cloud.
Read full post Speaking at International Conference on Cyber Security, FBI director Christopher Wray pointed to a rise in nation-state attacks – and strong encryption that limits bureau investigations.
Read full post Shifting left is more than a catchy phrase. It’s a mindset that emphasizes the need to think about security in all phases of the software development life cycle.
Read full post A company’s ability to successfully reduce risk starts with building a solid security foundation.
Read full post PeopleSoft and WebLogic app servers, as well as cloud systems using WebLogic, hacked and used to net some $226K in digital currency.
Read full post Get ready for car-delivered ads tailored to your whereabouts and your typical routes.
Read full post Bitcoin, the progenitor of the entire cryptocurrency boom and still the most popular virtual currency, experienced a truly heady run-up in value. Its price surge was punctuated with a crescendo midway through December, when a single bitcoin...
Read full post The FTC said VTech transmitted and stored information without intrusion prevention, detection or encryption, in spite of policy claims.
Read full post The successful cyberattack exposed information belonging to millions of UK customers.
Read full post Remember how we keep telling you that HTTPS is about more than just privacy? Well, here’s a timely reminder why…coffeshop coin mining!
Read full post In recent data theft campaigns, the APT group has been downloading malware from what appears to be legitimate Adobe URLs and IP addresses, ESET says.
Read full post Exclusive interview with Windows Security lead on how 2017 was a “return to retro” security threats and 2018 will bring increasingly targeted, advanced, and dangerous cyberattacks.
Read full post Bricked devices, penetration tests, and virtual reality were among the themes submitted in our latest holiday caption competition. And the winners are …
Read full post Windows servers will see biggest degradation, as will Windows 7 and 8 client machines, Microsoft said.
Microsoft says older Windows versions will face greatest performance hits after Meltdown, Spectre patches
Read full post Windows 7 and Windows 8 users will notice the greatest decrease in system performance after the processor patches are applied.
Read full post FBI director Christopher Wray said he supports strong encryption but called an inability to access encrypted devices an “urgent public safety issue.”
Read full post Not long ago trumpeted as the world’s largest biometric database, India’s Aadhaar system covering 1.2bn citizens is rapidly acquiring a less impressive reputation as the easiest to breach.
Read full post VCs splashed a record $4B in funding in the cybersecurity pool – here are some highlights among the early- to middle-stage startups who snagged big deals last year.
Read full post In order to establish persistence on the system, the installer tampers with the operating system’s registry. It also creates an administrative account that allows remote access. The post ESET research: Appearances are deceiving with Turla’s backdoor-laced Flash...
Read full post Your chances of being searched at a US border crossing are now at an all-time high. But the chances that border agents will be pulling data from your devices declined this past week – at least by...
Read full post The plan was going well, until the ‘hitman’ turned out to be working for the FBI.
Read full post Self-service ad-targeting tools could have squeezed users’ phone numbers from their email addresses… verrrrry sloooowly.
Read full post There’s a lot at stake when it comes to patching the hardware flaws.
Read full post A malware tool for stealthily installing software that mines the Monero virtual currency looks like the handiwork of North Korean threat actors, AlienVault says.
Read full post Finally, a security reprieve for open Wi-Fi hotspot users.
Read full post More than 300 organizations associated with the 2018 Olympics have been hit with a targeted email campaign.
Read full post WPA2 protocol enhancements bring stronger security protection and best practices, while new WPA3 protocol offers new security capabilities.
Read full post The US Departments of Commerce and Homeland Security identify the challenges of, and potential actions against, automated cyberattacks.