Cybersecurity News, Articles and Updates

Android.Lockerscreen using pseudorandom passcodes to ensure payouts

Android.Lockerscreen using pseudorandom passcodes to ensure payouts

By

The Android.Lockerscreen ransomware is now using pseudorandom numbers and other tactics to prevent victims from unlocking devices without paying.

Rep. Lieu questions federal CISO on cybersecurity plans

Rep. Lieu questions federal CISO on cybersecurity plans

By

Rep. Ted Lieu (D-Calif.) quizzed newly appointed federal CIO Gen. Greg Touhill on why the General Accounting Office's cybersecurity recommendations have not implemented.

69% of office professionals in the UK hoard data

69% of office professionals in the UK hoard data

Over three-quarters (77 percent) of IT decision makers worldwide are now more concerned about the impact of data hoarding than they were a year ago.

86% of over-55s worldwide think they're safe from cyber-criminals

86% of over-55s worldwide think they're safe from cyber-criminals

Nearly all (86 percent) over-55s don't believe that they're targets for cyber-criminals.

RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void

RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void

By

Malwarebytes researchers spotted a large malvertising campaign delivering the RIG exploit kit on popular sites including answers(dot)com.

Yahoo faces congressional action and class action lawsuits following historic data breach

Yahoo faces congressional action and class action lawsuits following historic data breach

By

Yahoo is facing both legal and congressional action in the form of multiple class-action lawsuits and one senators call for a congressional probe.

Cyber space wars may require new international regimes

Cyber space wars may require new international regimes

By

While it might not include the Death Star cyber warfare among the stars is almost inevitable.

Malicious apps leveraging top UK brands has increased by 130%

Malicious apps leveraging top UK brands has increased by 130%

The number of malicious apps leveraging top UK brands has grown by 130 percent year on year.

SC Roundtable: The Threat Landscape

SC Roundtable: The Threat Landscape

A host of security professionals joined SC yesterday for a frank discussion on the looming threat landscape

Air Force reports making progess on cybersecurity without additional funding

Air Force reports making progess on cybersecurity without additional funding

By

The Air Force is reporting progress in its mission to secure its weapons against cyberattacks.

Krebs website withstands historically large DDoS attack; enormous botnet suspected

Krebs website withstands historically large DDoS attack; enormous botnet suspected

By

Cybersecurity blog site KrebsOnSecurity was barraged Tuesday evening by an extraordinary DDoS attack boasting a bandwidth between 620 and 665 Gbps - one of the largest such attacks in history.

White hats save greybeards from black hat attack

White hats save greybeards from black hat attack

As yet another well-known consumer brand falls victim to 'old version syndrome' and serves up malware to its customers; we ask, why lessons aren't being learned?

76% of security pros believe threat intelligence should be shared

76% of security pros believe threat intelligence should be shared

Many security professionals believe that they have a moral responsibility to share threat intelligence

Global study: Is IT security making progress against cyber-attacks?

Global study: Is IT security making progress against cyber-attacks?

CyberArk's 10th annual Global Advanced Threat Landscape Survey conducts research on global enterprises and whether they are learning from cyber-attacks and what priorities are being influenced.

Cloudflare looks to TLS 1.3 to secure internet

Cloudflare looks to TLS 1.3 to secure internet

By

Amongst various security features, cloud-provider Cloudflare looks to TLS 1.3 to secure internet.

Former insurance employees appear in court over data leak

Former insurance employees appear in court over data leak

Two people have been charged with bribery offences, following an investigation into the suspected leak of confidential data by a former employee of insurance firm LV=.

iSpy keylogger can be leased for the low, low price of $25

iSpy keylogger can be leased for the low, low price of $25

By

A new commercial keylogger nicknamed iSpy that is capable of snatching every keystroke and fully examining the data on an infected computer has been spotted by Zscaler being sold on underground forums for as little as $25.

Ponemon study: business innovation and IT security often do not go hand in hand

Ponemon study: business innovation and IT security often do not go hand in hand

New research from the Ponemon Institute in partnership with Micro Focus claims business innovation and IT security often do not go hand in hand.

FT Cyber-Summit: Ilia Kolochenko - throwing cash on the fire doesn't work

FT Cyber-Summit: Ilia Kolochenko - throwing cash on the fire doesn't work

High-Tech Bridge CEO Ilia Kolochenko advised a crowd at today's FT Cyber-Summit that we should all "keep is simple", as most breaches happen due to "obvious" mistakes.

Report, framework to balance safety and reliability needs of industrial operations

Report, framework to balance safety and reliability needs of industrial operations

By

The Industrial Internet Consortium (IIC) published a framework technical report to help organizations balance the safety and reliability needs of industrial operations.

It's time to find an alternative to multi-factor authentication

It's time to find an alternative to multi-factor authentication

There's no doubt that multi-factor authentication is a strong way to protect your data — and the more factors you need to use to authenticate yourself, the stronger that protection becomes.

Hackers crack Tesla CAN Bus, DoT issues policy for securing connected car

Hackers crack Tesla CAN Bus, DoT issues policy for securing connected car

By

Researchers claim they were able to crack into Tesla's CAN Bus to achieve remote control of the electric car and the DoT just issued a new policy concerning automated vehicles.

DetoxCrypto ransomware imitates Malwarebytes software

DetoxCrypto ransomware imitates Malwarebytes software

By

Malwarebytes is warning users of a a variant of DetoxCrypto ransomware that is imitating the security vendor's software.

Uber, Airbnb, Dropbox, and others form coalition to evaluate vendor cyber risks

Uber, Airbnb, Dropbox, and others form coalition to evaluate vendor cyber risks

By

VSA coalition forms with the goal of streamlining the vetting process that businesses use for evaluating vendors' cybersecurity risks.

Researcher believes major DDoS attacks part of military recon to shut down internet

Researcher believes major DDoS attacks part of military recon to shut down internet

By

The attacks targeted major companies that provide internet infrastructure and appear to have probed the companies' defenses to determine capabilities.

Cold case: Finnish police advise owners to store smart keys in fridge

Finnish police are advising owners of cars with "smart" locking systems to put the keys in the fridge when they are at home.

NSA and Cyber Command urged to split, A.I. to become part of U.S. cyber strategy

NSA and Cyber Command urged to split, A.I. to become part of U.S. cyber strategy

By

President Obama may be urged to split the joint leadership of the NSA and U.S. Cyber Command in favor of two distinct forces for cyberespionage and cyberwarfare.

Google Chrome releases stable channel update

Google Chrome releases stable channel update

By

Google Chrome released a stable channel update for its desktop applications for Windows, Mac and Linux.

Study finds gamer cyber hygiene stinks

Study finds gamer cyber hygiene stinks

By

As online gaming grows in popularity ESET researchers found that cybersecurity measures haven't kept pace with growth.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US