security.didici.cc

Schneier warns of 'perfect storm': Tech is becoming autonomous, and security is garbage

1 hour ago

Tel Aviv treated to Brucey's bonus views Israel Cyber Week  With insecure computers in charge, the healthcare and transportation sectors have become a nexus of security problems, infosec veteran Bruce Schneier warned delegates at Israel Cyber Week.…

Don't panic, but your baby monitor can be hacked into a spycam

4 hours ago

Researchers confirm hardware vulnerable to remote attacks Security researchers say they can back up a mother's claim that her baby monitor had been remotely hacked and used to spy on her family.…

Destructive Nation-State Cyber Attacks Will Rise, Say European Infosec Pros

13 hours ago

More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.

PayPal shopping spree continues, buys Simility for $120 million

13 hours ago

The purchase is the fourth acquisition in the last 12 months.

Sneaky Web Tracking Technique Under Heavy Scrutiny by GDPR

13 hours ago

Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even with GDPR, warns the EFF.

Smartphones to become car keys by 2019

14 hours ago

Common NFC standards struck.

Israeli government weighs in on Facebook privacy, promises action

14 hours ago

Intelligence boss whines about smartphone privacy Facebook - already kicked around the block by politicians in the US and Europe over privacy in the wake of the Cambridge Analytica scandal - has come under fire from Israel.…

Four New Vulnerabilities in Phoenix Contact Industrial Switches

14 hours ago

A series of newly disclosed vulnerabilities could allow an attacker to gain control of industrial switches.

Want to know what all that Fortnite hype is about? Android users need to be careful

15 hours ago

Malware writers preying on the game-curious with fake apps With online gaming hit Fornite set to make its debut on Android, malware writers are already playing on the game's hype to ensnare victims.…

Artificial Intelligence & the Security Market

15 hours ago

A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs.

Click2Gov Breaches Attributed to WebLogic Application Flaw

15 hours ago

At least 10 US cities running Click2Gov software have alerted citizens to a data breach, but it turns out the problem was in the application server.

Over half of Americans would stop using an app if their messages could be read by others

15 hours ago

Social media platforms must evolve to higher privacy standards -- to stop their users leaving for more secure channels.

7 Places Where Privacy and Security Collide

16 hours ago

Privacy and security can experience tension at a number of points in the enterprise. Here are seven - plus some possibilities for easing the strain.

Financial Services Sector Rife with Hidden Tunnels

16 hours ago

Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight.

Templates: The Most Powerful (And Underrated) Infrastructure Security Tool

16 hours ago

If your team is manually building cloud instances and networks for every application, you're setting yourself up for a data breach.

Microsoft Office: The Go-To Platform for Zero-Day Exploits

17 hours ago

Malicious Office documents are the weapon of choice among cybercriminals, who use files to access remotely hosted malicious components.

Google adds a search feature to account settings to ease use

17 hours ago

Google has announced a refresh of the Google Accounts user interface. The changes are intended to make it easier for users to navigate settings and review data the company has associated with an account — including information relating to devices, paym ...

WannaCry is back! (Psych. It's just phisher folk doing what they do)

18 hours ago

Spamming scum fire out phishing frighteners An unusually large wave of phishing emails was spewed out this morning, with recipients warned that all their devices had been infected by WannaCry.…

Private browsing: 16 good reasons to use incognito mode

19 hours ago

Also known as private browsing or porn mode, your browser privacy setting has all sorts of useful applications that have nothing to do with hiding the consumption of adult content.

White House Email Security Faux Pas?

20 hours ago

The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.

AppSec in the World of 'Serverless'

20 hours ago

The term 'application security' still applies to 'serverless' technology, but the line where application settings start and infrastructure ends is blurring.

Apple iPhone, Samsung owners: Unlocking your car by phone just moved step closer

21 hours ago

Apple and Samsung are part of group working on a standard to ensure Digital Key will be reliable and unhackable.

Twitter acquires anti-abuse technology provider Smyte

21 hours ago

Twitter this morning announced it has agreed to buy San Francisco-based technology company Smyte, which describes itself as “trust and safety as a service.” Founded in 2014 by former Google and Instagram engineers, Smyte offers tools to stop online ...

Tesla: We're now suing ex-employee for alleged theft of gigabytes of trade secrets

22 hours ago

Tesla accuses former employee of hacking, stealing data, and leaking false information to the media.

Algeria Shut Down the Internet to Prevent Students from Cheating on Exams

22 hours ago

Algeria shut the Internet down nationwide to prevent high-school students from cheating on their exams. The solution in New South Wales, Australia was to ban smartphones.

Cisco patches critical Nexus flaws: Are your switches vulnerable?

23 hours ago

You'll need to wade through Cisco's advisories to work out if software you're running is vulnerable or already fixed.

​Cybersecurity: Why this Spanish region has just created new research center

1 day ago

Amid recent political upheaval, Catalonia in northeastern Spain is bringing together its security initiatives.

Israel cyberczar drops hints about country's new security initiative

1 day ago

PM pops in to brag about industry wins Israel Cyber Week  Israel is planning to develop a "state-level cyber-shield" to improve its resilience against hacking and malware, the country's newly appointed cyberczar said on Wednesday.…

Please tighten your passwords and assume the brace position, says plane-tracking site

1 day ago

Data breach at Flightradar24 scored some email addresses and hashed passwords Aviation professionals enthusiasts have been told to change their passwords after flight-tracking site flightradar24/ warned of a data breach.…

Flinders Uni transforms its identity management

1 day ago

Removes major roadblock for students to accept study offers.

Hot stuff! Rebind rewind unkind to IoT networks

1 day ago

Old-school DNS attack messes up routers, streaming boxes An attack technique first disclosed more than a decade ago is resurfacing as a way to manipulate IoT and home network devices.…

Are your IoT gizmos, music boxes, smart home kit vulnerable to DNS rebinding attacks? Here's how to check

1 day ago

Fancy website, code emitted – Roku, Google, etc stuff at risk A technique for attacking computer networks, first disclosed more than a decade ago, has resurfaced as a way to manipulate Internet-of-Things gadgets, smart home equipment, and streaming ente ...

We don't mean to alarm you but IBM’s McAfee-as-a-service cloudy antivirus is wobbling

1 day ago

Big Blue’s restoring something from backups, but the problem's 20 hours old and counting IBM’s cloud is experiencing an “unplanned event” that means its McAfee-as-a-service offering is not currently at its best.…

Script kiddie goes from 'Bitcoin Baron' to 'Lockup Lodger' after DDoSing 911 systems

1 day ago

US bloke gets 20 months for knackering city govt IT A 23-year-old Arizona man was thrown in the cooler this week after he admitted being the not-quite-infamous website-rattling "Bitcoin Baron".…

Microsoft Edge bug odyssey shows why we can't have nice things

1 day ago

Fixing security issues in the face of standards gaps and vendor silence isn't easy Earlier this year, Jake Archibald, developer advocate for Google Chrome, found a bug affecting Mozilla Firefox and Microsoft Edge and had two very different experiences try ...

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks

1 day ago

Hackers are using the infrastructure, meant to transmit data between applications, for command and control.

Tesla names former Gigafactory hand as 'sabotage' mastermind

1 day ago

Musk blames bad Tripp Tesla has filed suit against the man it claims was behind an effort to sabotage the electric car maker.…

China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms

1 day ago

Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.

Private sector needs a little sumthin' sumthin' to get it sharing threat intel – US security chap

1 day ago

Sharing's caring, intone government bods Israel Cyber Week  The UK's National Cyber Security Center, the information assurance division of GCHQ, might be getting a regulatory function or charging for its services before settling into the role of encourag ...

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites

1 day ago

Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates.

Inside a SamSam Ransomware Attack

1 day ago

Here's how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown.

Intel VP Talks Data Security Focus Amid Rise of Blockchain, AI

1 day ago

Intel vice president Rick Echevarria discusses the challenges of balancing data security with new technologies like blockchain and artificial intelligence.

Mylobot Botnet Emerges with Rare Level of Complexity

1 day ago

A new botnet from the Dark Web displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools.

Air-gapping the planet: How to travel safely in digitally scary places

1 day ago

If you're considering traveling to one of the many countries that has a dubious relationship with digital privacy, you'll need to protect yourself. While the standard advice is a VPN, David Gewirtz takes you a few steps deeper into the murky cloak and dag ...

At last, a use for Intel's SGX – locking AI and blockchain, says Intel

1 day ago

Bias-enabling algorithms and smart contract tech no one quite trusts now easier to secure At the Cyber Week security conference in Israel on Tuesday, chip giant Intel plans to discuss how it is addressing threats to the overexposed tech celebrities known ...

Alphabet Launches VirusTotal Monitor to Stop False Positives

1 day ago

Alphabet's Chronicle security division releases VirusTotal Monitor, a tool for developers to check if their product will be flagged as malware.

The dumbest passwords people still use

1 day ago

Everybody knows that 12345 is a bad password. But what they're using instead isn't much stronger

Improving the Adoption of Security Automation

1 day ago

Four barriers to automation and how to overcome them.

The Best and Worst Tasks for Security Automation

1 day ago

As with all new tech, there are good times and and bad times to use it. Security experts share which tasks to prioritize for automation.

Microsoft: This Azure password-banning tool will help kill off bad '[email protected]$$w0rd' habits

1 day ago

Admins can now significantly reduce the risk of accounts being compromised by password-spraying attacks.

Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill

1 day ago

Apple is rolling out an iOS security usability feature called Security code AutoFill. The basic idea is that the OS scans incoming SMS messages for security codes and suggests them in AutoFill, so that people can use them without having to memorize or typ ...

This new Windows malware wants to add your PC to a botnet - or worse

1 day ago

The intentions of and delivery method of Mylobot are unknown - but it appears to be the work of a sophisticated attacker who could deliver trojans, ransomware and more.

Mylobot Malware Brings New Sophistication to Botnets

1 day ago

The malware pulls together a variety of techniques to gain a foothold and remain undiscovered.

Shared, not stirred: GCHQ chief says Europe needs British spies

2 days ago

Director insists collaboration will continue after Brexit The head of GCHQ has publicly called for security co-operation with Britain's EU allies to continue after Brexit.…

World Cup 2018: The tech security challenges around the big event

2 days ago

All big events have tech security implications, but the World Cup in Russia throws up a few additional issues.

Hot new application for blockchain: How does botnet control sound?

2 days ago

It could happen, warns researcher BSides Tel Aviv  Blockchain technologies might be abused to create a takedown-resistant infrastructure for botnets.…

OpenBSD disables Intel’s hyper-threading

2 days ago

Cites security risk of different security domains on one core OpenBSD has disabled Intel’s hyper-threading technology, citing security concerns.…

Hackers steal $43m from cryptocurrency exchange

2 days ago

Second South Korean exchange targeted in a week.

(Cryptographically) sign me up! Android to take bad app checks offline

2 days ago

Can't get a network connection? No problem, Google OS will still be able to check signatures Google says Android will no longer require an internet connection to check whether applications are legit or potentially malicious.…

PayPal reminds users: TLS 1.2 and HTTP/1.1 are longer optional

2 days ago

Insecure connections will break after June 30th. And it's acquired Hyperwallet, too PayPal has reminded merchants that they must support TLS 1.2 and HTTP/1.1 by June 30.…

​South Korean crypto exchange Bithumb hacked

2 days ago

South Korean cryptocurrency exchange Bithumb has been hacked and tokens worth 35 billion won ($31.5 million) have been stolen, following the hack on compatriot Coinrail earlier this month.

Intel Hyperthreading causes Spectre worries

2 days ago

OpenBSD disables it via update.

Most Websites and Web Apps No Match for Attack Barrage

2 days ago

The average website is attacked 50 times per day, with small businesses especially vulnerable.

APT15 Pokes Its Head Out With Upgraded MirageFox RAT

2 days ago

This is the first evidence of the China-linked threat actor's activity since hacked the U.K. government and military in 2017 (which wasn't made public until 2018).

When It Comes To IoT Security, Liability Is Muddled

2 days ago

The onus behind IoT security has become so muddled that no one knows who to point fingers at.

Tesla Employee Steals, Sabotages Company Data

2 days ago

The electric carmaker is the victim of an "extensive and damaging" insider attack, says CEO Elon Musk.

Flightradar24 suffers security breach

2 days ago

Attackers hit single server.

WA govt creates new digital office

2 days ago

CIO function gets a new moniker.

Olympic Destroyer Returns to Target Biochemical Labs

2 days ago

The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure.

'Olympic Destroyer' Reappears in Attacks on Europe, Russia

2 days ago

The attack group known for targeting the 2018 Winter Olympics has resurfaced in campaigns against European financial and biochem companies.

Verizon stops selling customer location to two data brokers after one is caught leaking it

2 days ago

Verizon is cutting off access to its mobile customers’ real-time locations to two third-party data brokers “to prevent misuse of that information going forward.” The company announced the decision in a letter sent to Senator Ron Wyden (D-OR), who al ...

How to Prepare for 'WannaCry 2.0'

2 days ago

It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.

​Is the Indian government developing a tool for mass surveillance of its citizens?

2 days ago

If the tender is successful, it could be a disaster for the privacy of Indian citizens.

After scandal, Verizon and AT&T stop sharing real-time cell phone location data

2 days ago

The scandal erupted after one company claimed to be able to track any cell phone in the US "within seconds."

Former CIA Engineer Charged with Theft and Transmission of Classified Info

2 days ago

Suspect had reportedly been named in Vault 7 leak to WikiLeaks.

CrowdStrike Secures $20M Funding Round

2 days ago

The new funding round brings the company's valuation to more than $3 billion.

CrowdStrike Secures $200M Funding Round

2 days ago

The new funding round brings the company's valuation to more than $3 billion.

Cisco CPO: Privacy Is Not About Secrecy or Compliance

2 days ago

Michelle Dennedy sat down with Dark Reading at the recent Cisco Live to set the record straight about privacy, regulation, encryption, and more.

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

2 days ago

Do 'cloud-first' strategies create a security-second mindset?

Security Analytics Startup Uptycs Raises $10M in Series A

2 days ago

This round of funding for Uptycs, which runs an osquery-powered analytics platform, was led by ForgePoint Capital and Comcast Ventures.

Cryptography is the Bombe: Britain's Enigma-cracker on display in new home

2 days ago

Replica war-winner now in Bletchley Park's historic Block H The UK National Museum of Computing will open its new Bombe gallery this weekend at Bletchley Park in Milton Keynes after a successful crowdfunding campaign to put the WWII code-breaking machines ...

Elon Musk emails Tesla workers: 'We've been extensively sabotaged by employee'

2 days ago

Tesla employee leaks sensitive Tesla data to third parties and tried to sabotage its manufacturing software.

Free Societies are at a Disadvantage in National Cybersecurity

2 days ago

Jack Goldsmith and Stuart Russell just published an interesting paper, making the case that free and democratic nations are at a structural disadvantage in nation-on-nation cyberattack and defense. From a blog post: It seeks to explain why the United Sta ...

Um, excuse me. Do you have clearance to patch that MRI scanner?

3 days ago

Healthcare regulations working against cybersecurity, claims expert Israel Cyber Week  Healthcare regulations oblige medical equipment vendors to focus on developing the next generation of technologies rather than addressing current cybersecurity issues, ...

Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug

3 days ago

Brinkmann files third signature spoof vulnerability in a month Security researcher Marcus Brinkmann has turned up another vulnerability in the GnuPG cryptographic library, this time specific to the Simple Password Store.…

Kaspersky halts all European security projects

3 days ago

In response to EU ban.

NSW govt fronts up $20m to plug cyber security gaps

3 days ago

Following poor audit performance.

It's time for TLS 1.0 and 1.1 to die (die, die)

3 days ago

IETF floats formal deprecation suggestion, even for failback As TLS 1.3 inches towards publication into the Internet Engineering Task Force's RFC series, it's a surprise to realise that there are still lingering instances of TLS 1.0 and TLS 1.1.…

Fraudster admits she was OPM dealer: Leaked US govt staff files used to bag cash, car loans

3 days ago

Woman cops to using stolen records to open bank accounts A woman has fessed up to using people's personal information, leaked online from the US government's Office of Personnel Management mega-hack, to take out loans and open bank accounts.…

​Attorney-General'
s Department caught up in PageUp breach

3 days ago

The Attorney-General's Department joins Wesfarmers, the National Australia Bank, Telstra, the Reserve Bank of Australia, Australia Post, Medibank, and the ABC as those potentially affected by the PageUp data breach.

Yubico snatched my login token vulnerability to claim a $5k Google bug bounty, says bloke

3 days ago

USB gizmo biz apologies amid infosec drama Yubico has apologized to a security vulnerability researcher who had complained the dongle peddler lifted his work to nab a $5,000 Google bug bounty.…

Exposed Container Orchestration Systems Putting Many Orgs at Risk

3 days ago

More than 22,600 open container orchestration and API management systems discovered on the Internet.

Not so private eye: Got an Axis network cam? You'll need to patch it, unless you like hackers

3 days ago

According to magic people, VDOO people Researchers have detailed a string of vulnerabilities that, when exploited in combination, would allow for hundreds of models of internet-linked surveillance cameras to be remotely hijacked.…

“Unbreakable” Smart Lock Tapplock Issues Critical Security Patch

3 days ago

Researchers were able to discover a way to hack the device in less than an hour.

'Wallchart' Phishing Campaign Exploits World Cup Watchers

3 days ago

The details on a phishing attack designed to lure soccer fans with a subject line about the World Cup schedule and scoresheet.

PageUp security incident shows no sign of exfiltration

3 days ago

Still questions over what - if anything - was stolen.

Google Home, Chromecast Leak Location Information

3 days ago

The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices.

Mass. Man Pleads Guilty in ATM Jackpotting Operation

3 days ago

Citizens Bank ATM and others targeted in the scheme.

macOS QuickLook Feature Leaks Data Despite Encrypted Drive

3 days ago

Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature.

Vulnerabilities in these IoT cameras could give attackers full control, warn researchers

3 days ago

Researchers at VDOO discover vulnerabilities which, if left unpatched, could allow attackers to take control of the devices or rope cameras into botnets.

22K Open, Vulnerable Containers Found Exposed on the Net

3 days ago

Attackers can remotely access the infrastructure to install, remove or encrypt any application that the affected companies are running in the cloud.

F-Secure Buys MWR InfoSecurity

3 days ago

Finnish endpoint security company buys British security service provider in cash deal.

7 Ways Cybercriminals Are Scamming a Fortune from Cryptocurrencies

3 days ago

Cryptocurrencies, how do hackers love thee? Let us count the ways.

The paranoid's guide to traveling to digitally scary places like Russia or China

3 days ago

If you're considering traveling to one of the many countries that has a dubious relationship with digital privacy, you'll need to protect yourself. While the standard advice is a VPN, David Gewirtz takes you a few steps deeper into the murky cloak and dag ...

Strip Capita of defence IT contract unless things improve – Brit MPs

3 days ago

Committee calls for more public spending – but not with outsourcer A Parliamentary committee has called for Capita to be stripped of its military recruiting IT contract unless its performance improves, as part of a wider call for UK defence spending to ...

3 Tips for Driving User Buy-in to Security Policies

3 days ago

Teaching users why it's important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here's how.

Axis Cameras Riddled With Vulnerabilities Enabling “Full Control”

3 days ago

The IP cameras have a slew of bugs allowing bad actors to control them, add them to a botnet, or render them useless.

A bug in macOS' "Quick Look" feature leaks encrypted data, researchers find

3 days ago

"This makes using encrypted containers pointless," said security researcher Patrick Wardle.

This sneaky Windows malware delivers adware - and takes screenshots of your desktop

3 days ago

Zacinlo malware has been targeting Windows devices since 2012.

Kaspersky pulls plug on Europol joint venture after EU parliament vote to ban its software

3 days ago

Fresh political woes for Russian security firm Kaspersky, which has reacted angrily to a vote in the European Union Parliament last week to ban its software — on the grounds that it has been “confirmed as malicious“. Kaspersky denies this character ...

Ridiculously Insecure Smart Lock

3 days ago

Tapplock sells an "unbreakable" Internet-connected lock that you can open with your fingerprint. It turns out that: The lock broadcasts its Bluetooth MAC address in the clear, and you can calculate the unlock key from it. Any Tapplock account an unlock ...

'90s hacker collective man turned infosec VIP: Internet security hasn't improved in 20 years

3 days ago

L0pht luminary Chris Wysopal talks to The Reg Interview  It has been 20 years since Chris Wysopal (AKA Weld Pond) and his colleagues at the Boston-based L0pht* hacker collective famously testified before the US Senate that the internet was hopelessly ins ...

Huawei rebuts Australian 5G security concerns

3 days ago

Amid Sino-Canberra tensions.

Windows warning: US exposes North Korea government's Typeframe malware

4 days ago

North Korea's Hidden Cobra security hackers spawn new remote-access malware.

F-Secure to buy MWR InfoSecurity for ~$106M+ to offer better threat hunting

4 days ago

The ongoing shift of emphasis in the cyber security industry from defensive, reactive actions towards pro-active detection and response has fueled veteran Finnish security company F-Secure’s acquisition of MWR InfoSecurity, announced today. F-Secure is ...

Pwned with '4 lines of code': Researchers warn SCADA systems are still hopelessly insecure

4 days ago

How Shamoon and Stuxnet et al ran riot BSides  Industrial control systems could be exposed not just to remote hackers, but to local attacks and physical manipulation as well.…

US-CERT warns of more North Korean malware

4 days ago

'Typeframe' springs from the same den as 'Hidden Cobra' The United States Department of Homeland Security's Computer Emergency Response Team (US-CERT) has warned against another malware campaign it says originates from North Korea.…

AMP does maths on infosec shortage

4 days ago

Fresh eyes, broader reach.

Lack of collaboration, disclosure affecting APAC security posture

4 days ago

Threat actors are collaborating more effectively than legit businesses in the region, which aren't sharing enough intelligence with others in the industry, says Microsoft Asia CSO.

PageUp confirms some data compromised in breach

4 days ago

The SaaS-based recruitment firm has confirmed some data was compromised in the recent malware attack it suffered.

PageUp People revises data impacted by breach

4 days ago

Uncovers ‘very small amount’ of clear text password data.

Huawei pushes 5G cybersecurity with Australian government

4 days ago

Huawei Australia has again said it is open and transparent about cybersecurity concerns, pushing for discussions with the federal government to take part in the 5G build-out.

Silk road adviser caught, Kaspersky sues Dutch paper, and Vietnam's tech clampdown

5 days ago

Also, Weight Watchers is light on security Roundup  This week included a big Patch Tuesday bundle, a fresh fine for Yahoo!, and yet another Intel bug that potentially exposes sensitive kernel information.…

Boffins make speculative execution great again with Spectre/Meltdown fix

6 days ago

Good thing too because Intel's planned chip changes may break Google's Retpoline fix A group of computer science researchers has proposed a way to overcome the security risk posed by speculative execution, the data processing technique behind the Spectre ...

Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix

6 days ago

Good thing too because Intel's planned chip changes may break Google's Retpoline A group of computer science researchers has proposed a way to overcome the security risk posed by speculative execution, the data processing technique behind the Spectre and ...

Vermont Librarian Wins Small-Claims Suit Against Equifax

6 days ago

In a David-and-Goliath moment, the 49-year-old librarian has won satisfaction in the wake of its head-spinningly massive 2017 data breach.

Friday Squid Blogging: Cephalopod Week on Science Friday

6 days ago

It's Cephalopod Week! "Three hearts, eight arms, can't lose." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

WannaCry Kill Switch Hero Faces New Charges, But Code Evals Say Little

6 days ago

The Feds say Marcus Hutchins is behind both the UPAS Kit backdoor and the Kronos banking trojan.

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks

6 days ago

Attacks directed at targets in Singapore went through the roof earlier this week.

New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions

6 days ago

While other malware families have been searching for new overlay techniques for Android 7 and 8, MysteryBot appears to have found a solution.

Email and Social Media are Still Security Nightmares: New Threat Report

6 days ago

A new quarterly threat report says that phishing and banking trojans continue to be major threats brought into the enterprise through email and social media.

Email and Social Media are Still Security Nightmares

6 days ago

Phishing and banking trojans continue to be major threats brought into the enterprise.

Email, Social Media Still Security Nightmares

6 days ago

Phishing and banking trojans continue to be major threats brought into the enterprise.

Hackers Crack iPhone Defense Built to Block Forensic Tools

6 days ago

Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.

Sir, you've been using Kaspersky Lab antivirus. Please come with us, sir

6 days ago

US govt bans agencies from using Russian outfit's wares The US government issued an interim rule this morning prohibiting agencies from using products or services that have pretty much anything to do with Kaspersky Lab.…

Can Russian hackers be stopped? Here's why it might take 20 years

6 days ago

Deterring hackers is almost impossible when the rewards are so great and the risks are so low. Can anything stop them?