Read full post Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere.
Read full post New details on old cyberattacks originating from North Korea indicate several forms of malware unintentionally spread wider than authors intended.
Read full post Security experts need a front-row seat in the application development process but not at the expense of the business.
Read full post A solid approach to change management can help prevent problems downstream.
Read full post Participants managed to secure themselves over $103,000 in rewards.
Read full post Another day, another exposed Amazon S3 server.
Read full post A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition. The post Concerns about data breaches hitting all-time high appeared first on WeLiveSecurity
Read full post Hey baby, nice little “abc123” ya got there.
Read full post As cryptocurrency values have soared, so too has the cost of the hardware needed to mine them – if you can even buy the GPUs, given the shortages.
Read full post Cisco Talos says the gang responsible has managed to steal millions of dollars through phishing campaigns.
Read full post Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as...
Read full post The launch and growth of new operating systems is mirrored by an increase in reported vulnerabilities.
Read full post Banks and financial services companies in New York must file by tomorrow to certify they are compliant with the state Department of Financial Services’ new cybersecurity regulation, 23 NYCRR 500.
Read full post Microprocessor giant adds vulnerability-finding category for Meltdown, Spectre-type flaws.
Read full post The Salon news site are offering users a novel choice: turn off your adblocker or let it use your browser to mine cryptocurrency
Read full post A 9.6% increase just in the past year, and denial-of-service attacks are partly to blame.
Read full post Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.
Read full post Exploits are getting more sophisticated by the day, and cybersecurity technology just isn’t keeping up.
Read full post This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft. The post Patch now! Microsoft...
Read full post Bug hunters can expect to be paid for their efforts now the Fitbit public and private programs have merged.
Read full post Fraser Howard of SophosLabs teaches us about cryptojacking – where crooks mine for cryptocurrency, but someone else pays for the electricity.
Read full post As far as Bitcoin miners are concerned, Iceland is starting to look like the best place in the world to run a business.
Read full post Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt...
Read full post And it won’t rule out forcing big companies like Google and Facebook to use it.
Read full post It was one flaky pastry: “great profits continuously every month,” zero details on its “Loop Algorithm,” and nary a single detail on its team.
Read full post Microsoft protected Windows users from suspected North Korean exploitation of an Adobe zero-day bug earlier this month.
Read full post While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.
Read full post A new Lazarus Group cyberattack campaign combines spear-phishing techniques with a cryptocurrency scanner designed to scan for Bitcoin wallets.
Read full post Google’s new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.
Read full post In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.