Read full post In order to establish persistence on the system, the installer tampers with the operating system’s registry. It also creates an administrative account that allows remote access. The post ESET research: Appearances are deceiving with Turla’s backdoor-laced Flash...
Read full post Your chances of being searched at a US border crossing are now at an all-time high. But the chances that border agents will be pulling data from your devices declined this past week – at least by...
Read full post The plan was going well, until the ‘hitman’ turned out to be working for the FBI.
Read full post Self-service ad-targeting tools could have squeezed users’ phone numbers from their email addresses… verrrrry sloooowly.
Read full post There’s a lot at stake when it comes to patching the hardware flaws.
Read full post A malware tool for stealthily installing software that mines the Monero virtual currency looks like the handiwork of North Korean threat actors, AlienVault says.
Read full post Finally, a security reprieve for open Wi-Fi hotspot users.
Read full post More than 300 organizations associated with the 2018 Olympics have been hit with a targeted email campaign.
Read full post WPA2 protocol enhancements bring stronger security protection and best practices, while new WPA3 protocol offers new security capabilities.
Read full post The US Departments of Commerce and Homeland Security identify the challenges of, and potential actions against, automated cyberattacks.
Read full post She’s teaching NEMESIS to find white nationalists’ so-called dog whistles – the Black Sun and Pepe the frog memes – with object recognition.
Read full post Information security and IT need to team up to make patch management more efficient and effective. Here’s how and why.
Read full post A new attack called CoffeeMiner can exploit public Wi-Fi services to secretly mine cryptocurrencies.
Read full post It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%....
Read full post The Tribune reports that hackers gained access to users’ names, addresses, phone numbers, and other PII.
Read full post One leading Democratic senator says the newly-enacted directives explicitly allow border officials to try to bypass the password or encryption on a device without reasonable suspicion.
Read full post “Alarming evolution” of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.
Read full post How an Intel design decision with no review by industry security consultants led to one of the biggest vulnerabilities in recent history.
Read full post The company’s fifth transparency report reveals more customer data was handed to US law enforcement in the first-half of last year than ever before.
Read full post Researchers have discovered severe vulnerabilities in the suite which can lead to full system takeover.
Read full post Following ads appearing next to hate-filled/extremist content, the bank says it’s not relying on Google to protect its brand.
Read full post The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel’s Core architecture used in PCs for many years, and also affecting...
Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst with a passion for all things security. Any questions? Just ask. Researchers Find...
Read full post It can be daunting to step into the often unfamiliar world of security, where you can at times be inundated with technical jargon (and where you face real consequences for making the wrong decision). Employing an MSP...
Read full post Apple alone remains silent so far on potential impact to its products and its plans to address new side-channel attack vulnerabilities.
Read full post A new means of exploiting Google Apps Script lets attackers deliver malware using URLs.
Read full post The new biometric-powered contactless cards use fingerprint recognition to authenticate the cardholder, in an effort to cut down on in-store fraud.
Read full post Former DHS OIG employee makes an unauthorized copy of PII data of DHS employees and parties involved in DHS OIG investigations.
Read full post Rather than scrambling to deal with attacks after the fact, companies need to focus on improving detection capabilities with tools that help them work within data laws, not outside of them.
Read full post The White House chief information security officer, whose job it is to protect the president and senior staff from cyber threats, was fired in February and has not been replaced.