Cybersecurity News, Articles and Updates

U.S. Customs and DHS: Passports please, and social media accounts?

U.S. Customs and DHS: Passports please, and social media accounts?

By

DHS and U.S. Customs propose screening of social media accounts for foreign travelers.

Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks

Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks

By

A recent survey found the majority of U.S. consumers regularly engage in risky public Wi-Fi behavior and are unaware of the risks they are running.

UK Cyber-security after Brexit: May not be as bad as it first appears

It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security every chance of staying in very good shape says Ilia Kolochenko.

MDM software compromises BYOD employee privacy: study

MDM software compromises BYOD employee privacy: study

By

MDM software, widely used to manage and secure employee devices in BYOD programs, compromise user privacy, according to a recent study.

FTC fines ad network for geo-tracking of millions of consumers without consent

FTC fines ad network for geo-tracking of millions of consumers without consent

By

The Federal Trade Commission (FTC) fined the InMobi ad network $950,000 for tracking the location of hundreds of millions of consumers without consent.

U.S., Israel team in cyber threat-sharing program

U.S., Israel team in cyber threat-sharing program

By

The U.S. and Israel are set will announce a bilateral threat sharing program that is expected to begin in the next few months.

Phishing emails claim virus in iTunes database

Phishing emails claim virus in iTunes database

By

Scammers looked to steal payment information from Apple customers using phishing emails claiming that a virus was detected in the iTunes database.

Vermont Fish & Wildlife Department reports customer data compromised

By

The Vermont Fish & Wildlife Department reported that customer data may have been compromised on two separate occasions.

Acer breach caused by improperly stored data

Acer breach caused by improperly stored data

By

Acer reported a security breach compromised the sensitive data of nearly 34,500 online shoppers.

Lizard Squad-linked hacker claims attack against Blizzard servers

Lizard Squad-linked hacker claims attack against Blizzard servers

By

A Lizard Squad linked hacker taunted Blizzard Entertainment after server issues affected popular gaming networks.

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

By

Kaspersky Lab researchers spotted a unique Russian banker trojan, dubbed "Lurk" targeting various industries.

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Chief Information Security Officers (CISO) today no longer sit in the IT and security corner doing "techie" things.

ESnet iPerf tool vulnerable to remote code execution attacks

ESnet iPerf tool vulnerable to remote code execution attacks

By

Cisco Talos researchers spotted a vulnerability in ESnet iPerf3 that could allow remote code execution.

PDFium vulnerability in Google Chrome enabled arbitrary code execution

PDFium vulnerability in Google Chrome enabled arbitrary code execution

By

Cisco Talos researchers spotted an arbitrary code execution vulnerability in PDFium, Google Chrome's default PDF reader.

Report finds millions of firewall ports left open unnecessarily

Report finds millions of firewall ports left open unnecessarily

A survey of all the ports on the internet is designed to provide decision-makers with the statistical information they need to make informed decisions on engineering the internet - and reveals many, many are open to hackers.

UK Parliament passes Investigatory Powers Bill

UK Parliament passes Investigatory Powers Bill

Most MPs in the UK House of Commons have agreed to pass the Investigatory Powers Bill, in a vote of 444-69 in favour, most Labour MPs who had appeared to be against the bill voted in favour of it.

Botnet used to deliver Dridex and Locky vanishes

Botnet used to deliver Dridex and Locky vanishes

By

The botnet that was used to deliver Dridex and Locky appears to have vanished.

InfoSec 2016: 3/4 experts agree working together crucial to incident response

InfoSec 2016: 3/4 experts agree working together crucial to incident response

A group of industry experts joined for a panel to discuss enterprise-wide cyber-incident response plans and proactive techniques for a rapid response and three of the four panellists agreed it's all about the people.

New macros attacks use Anti-VM and Anti-Sandbox techniques

New macros attacks use Anti-VM and Anti-Sandbox techniques

By

Zscaler researchers spotted a new wave of macros docs using Anti-VM and Anti-Sandbox techniques.

A 'good neighbor' compromised State Farm customer data

A 'good neighbor' compromised State Farm customer data

By

State Farm is alerting customers of a data security incident involving a third party vendor's misuse of customer information.

75% of UK consumers won't do biz with a company that has been hacked

75% of UK consumers won't do biz with a company that has been hacked

Three quarters of UK consumers would stop doing business or cancel memberships with an organisation if it was hacked.

Zuckerberg cyber-zecurity zucks!

Zuckerberg cyber-zecurity zucks!

It seems that the Facebook founder has committed one of the cardinal sins of cyber-security and used the same password for different accounts, resulting in a public shaming.

 Top to bottom assurance

Top to bottom assurance

By

A company usually takes its cues from leaders at the top: What the top executives emphasize will become the organization's imperatives, and what they ignore will typically fall by the wayside.

Strategize to gain advantage in corporate cybersecurity war

Strategize to gain advantage in corporate cybersecurity war

By

At SC Congress Toronto retired Brigadier Gen. Charly Shugg, COO at Sylint, stressed the importance of having a cybersecurity strategy.

Data of 40,000 Stamford Podiatry Group patients compromised

By

Connecticut-based Stamford Podiatry Group is notifying its patients that medical and personal information was compromised in a recent security incident.

Lenovo advises users to remove vulnerable preinstalled app

Lenovo advises users to remove vulnerable preinstalled app

By

Lenovo advised users to remove a preloaded application after a vulnerability was spotted that could allow MitM attacks.

NFL players' medical records stolen from Washington trainer

NFL players' medical records stolen from Washington trainer

By

The NFL recently informed its players through the NFL Players Association that thousands of electronic and paper medical records were stolen.

No hacking required: Israeli researchers show how to steal data through PC components

No hacking required: Israeli researchers show how to steal data through PC components

By

Israel Institute of Technology researchers develop attacks to steal data using data leaked through computer components.

Time confirms Myspace breach, 360M accounts potentially affected

Time confirms Myspace breach, 360M accounts potentially affected

By

Time Inc. confirmed Tuesday that several Myspace accounts were breached just before the Memorial Day weekend.

Don't connect your charging cell to a computer or you may get hacked!

Don't connect your charging cell to a computer or you may get hacked!

Connecting your mobile device to a computer using a USB cable could make you vulnerable to hackers.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US