Don’t Forget Basic Security Measures, Experts Say

Read full post Some security leaders argue there is little point in worrying about emerging threats when businesses can’t defend against today’s attacks.

/ May 18, 2017

Android Users Fail to Run Latest OS Version

Read full post A study finds 98% of Android devices are not running the latest software version, according to a report released today by Zimperium.

/ May 18, 2017

Android Users Fail to Run Latest OS Version

Read full post A study finds 98% of Android devices are not running the latest software version, according to a report released today by Zimperium.

/ May 18, 2017

Font sharing site DaFont has been hacked, exposing thousands of accounts

Read full post Over 98 percent of the passwords were cracked, thanks to the site’s poor password security.

/ May 18, 2017

All Generations, All Risks, All Contained: A How-To Guide

Read full post Organizations must have a security plan that considers all of their employees.

/ May 18, 2017

All Generations, All Risks, All Contained: A How-To Guide

Read full post Organizations must have a security plan that considers all of their employees.

/ May 18, 2017

News in brief: 17m passwords stolen from Zomato; laptop ban from EU shelved; hackers target MPs

Read full post Your daily round-up of some of the other stories in the news

/ May 18, 2017

NSA Tools Behind WannaCry Being Used In Even Bigger Attack Campaign

Read full post Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.

/ May 18, 2017

NSA Tools Behind WannaCry Being Used In Even Bigger Attack Campaign

Read full post Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.

/ May 18, 2017

WannaCry: Ransomware Catastrophe or Failure?

Read full post Using Bitcoin payments as a measure, the WannaCry attack is not nearly as profitable as the headlines suggest. But you should still patch your Windows systems and educate users.

/ May 18, 2017

Are you protected against WannaCryptor and other forms of ransomware?

Read full post Technology evangelist Marc Saltzman asks: Are you protected against WannaCryptor, aka WannaCry, and other forms of ransomware? The post Are you protected against WannaCryptor and other forms of ransomware? appeared first on WeLiveSecurity

/ May 18, 2017

Have you inadvertently joined a Trump-supporting robot army?

Read full post If your data was exposed in one of two recent breaches, there’s a good chance your details have been used by an army of bots to support the proposals to end net neutrality

/ May 18, 2017

Facebook is losing the fight against the spread of fake news

Read full post How can you work out what’s true and what’s not in the torrent of stories on Facebook when the platform itself can’t reliably flag up a fake story?

/ May 18, 2017

Clavister Partners with Webroot for IP Reputation

Read full post Webroot recently announced a new collaboration with Clavister, a leader in the network security market. Clavister selected Webroot’s BrightCloud® IP Reputation Service. The solution detects malicious activity within users’ IT infrastructure and delivers actionable threat intelligence. We...

/ May 18, 2017

WannaCryptor: Are governments and financial regulators to blame?

Read full post Are governments and financial regulators to blame for WannaCryptor, aka WannaCry, asks Tony Anscombe in this insightful feature. The post WannaCryptor: Are governments and financial regulators to blame? appeared first on WeLiveSecurity

/ May 18, 2017

WannaCryptor: Are governments and financial regulators to blame?

Read full post Are governments and financial regulators to blame for WannaCryptor, aka WannaCry, asks Tony Anscombe in this insightful feature. The post WannaCryptor: Are governments and financial regulators to blame? appeared first on WeLiveSecurity

/ May 18, 2017

FireEye CEO Mandia Talks Rapid Rise of Nation-State Threats

Read full post FireEye CEO Kevin Mandia at Interop ITX discussed changes in the geopolitical threat landscape and how attackers target their victims.

/ May 17, 2017

Why We Need a Data-Driven Cybersecurity Market

Read full post NIST should bring together industry to create a standard set of metrics and develop better ways to share information.

/ May 17, 2017

How WannaCrypt attacks

Read full post WannaCrypt’s roots — the malware behind world’s biggest ransomware attack ever — lie in an old Windows network protocol.

/ May 17, 2017

News in brief: warning on extending laptop ban; telecom customers alerted; watchdog opens data probe

Read full post Your daily round-up of some of the other stories in the news

/ May 17, 2017

Congress introduces bill to stop US from stockpiling cyber-weapons

Read full post The bill would ensure that all software and hardware vulnerabilities in the US government’s possession are properly reviewed in an effort to avoid a similar mass leak of NSA hacking tools and cyber-weapons.

/ May 17, 2017

Reuben Paul still at it with connected toys hack

Read full post Cybersecurity genius Reuben Paul demonstrates that connected toys can be used for malicious purposes at the World Forum in The Hague. The post Reuben Paul still at it with connected toys hack appeared first on WeLiveSecurity

/ May 17, 2017

Survey: Unpatched Windows OS on the Rise

Read full post Despite the rise in vulnerabilities, the percentage of unpatched Windows operating systems grew in the first quarter compared to the previous year.

/ May 17, 2017

Inside the Motivations Behind Modern Cyberattackers

Read full post Attackers seeking money, dominance, and data are banding together and sharing infrastructure to target businesses.

/ May 17, 2017

How Big Fuzzing helps find holes in open source projects

Read full post Google’s beta project, OSS-Fuzz, has found 264 vulnerabilities in 47 open-source projects – so is it an idea whose time has come?

/ May 17, 2017

UK police charge activist under terrorism law for refusing to hand over passwords

Read full post The controversial “schedule 7” law can compel a person at the UK border to turn over device passwords.

/ May 17, 2017

The Fundamental Flaw in TCP/IP: Connecting Everything

Read full post Almost 30 years after its inception, it’s time to fix the engine that both fuels the modern day Internet and is the root cause of its most vexing security challenges.

/ May 17, 2017

Cryptocurrency-mining malware cashes in on NSA exploit that enabled WannaCry

Read full post WannaCry continues to hit headlines, but it’s not the first piece of malware to make use of the NSA’s EternalBlue exploit

/ May 17, 2017

WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak

Read full post The massive campaign that spread the WannaCry ransomware wasn’t the only large-scale infection misusing the EternalBlue and DoublePulsar exploits. The post WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak appeared...

/ May 17, 2017

Brooks Brothers reveals theft of payment card details

Read full post Retailer suggests ‘unauthorized individual’ was behind the breach – and says it’s now resolved

/ May 17, 2017

WannaCry’s ‘Kill Switch’ May Have Been a Sandbox-Evasion Tool

Read full post Massive ransomware worm attack appears to have come with a poorly planned anti-analysis feature.

/ May 16, 2017

ShadowBrokers To Launch Monthly Subscription Service for Exploits

Read full post Think of it like a wine of the month club for attack tools and new exploits threat group says.

/ May 16, 2017

WannaCry: the ransomware worm that didn’t arrive on a phishing hook

Read full post Email doesn’t seem to have been the initial vector for WannaCry, which initially took hold in south-east Asia

/ May 16, 2017

In encryption push, Senate staff can now use Signal for secure messaging

Read full post Senate staffers can now use what is widely considered the world’s most secure messaging app.

/ May 16, 2017

New Threat Research Shows Vietnam a Rising Force in Cyberespionage

Read full post FireEye report on APT32 puts evidence together of a group attacking private and public targets for the sake of Vietnamese state interests.

/ May 16, 2017

DocuSign’s Brand Used in Phishing Attacks

Read full post The electronic signature company issued an update alert today that it noticed a rise in phishing attacks last week and this morning.

/ May 16, 2017

FTC Launches ‘Operation Tech Trap’ to Catch Fraudsters

Read full post The Federal Trade Commission has teamed up with law enforcement partners to crack down on tech support scams.

/ May 16, 2017

The Wide-Ranging Impact of New York’s Cybersecurity Regulations

Read full post New York’s toughest regulations yet are now in effect. Here’s what that means for your company.

/ May 16, 2017

News in brief: Depp film stolen by hackers; Facebook fined again; social media blocked in Ukraine

Read full post Your daily round-up of some of the other stories in the news

/ May 16, 2017

Hospitals rapped for sharing 1.6m patient records with Google

Read full post Passing the patient records to the Google-owned company to help it build a health app as ‘inappropriate’, warns watchdog

/ May 16, 2017