Email Security

Cyberattack knocks Lansing utility offline

Cyberattack knocks Lansing utility offline

By

The Lansing, Mich., Board of Water & Light (BWL) hopes to be fully back online today after suffering a cyberattack earlier this week that knocked the utility's internal computer systems offline.

37% of Brits share personal login details with friends or partners

37% of Brits share personal login details with friends or partners

Over 10 percent of the UK population has pretended to be someone else online by snooping or sending messages through someone else's social media or email accounts without their permission.

Empty email threats reap payoff for Armada Collective

Empty email threats reap payoff for Armada Collective

By

Emails sent to businesses demanding payment to avoid a DDoS attack were enough to spur some to pay off, even though no attacks resulted.

New version of TeslaCrypt ups ante for ransomware

New version of TeslaCrypt ups ante for ransomware

By

Two updates in TeslaCrypt illustrate that ransomware is not only spreading wider, but is also evolving with new capabilities.

Cytegic finds ties between terror and cyberattacks

Cytegic finds ties between terror and cyberattacks

By

The terror attacks that struck Belgium and France also kicked off a period of increased cyber attack activity in both countries, according to a report by Cytegic.

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

By

Stealing $100 million from a major U.S. corporation should be hard than setting up a fake email account, but for one cybercriminal enterprise this is all it took.

FBI efforts to break encryption go way back

FBI efforts to break encryption go way back

By

Well before the FBI's recent demand that Apple give up the keys to the encryption used in an iPhone 5c, the bureau engaged in a similar effort.

House Judiciary Panel passes Email Privacy Act 28-0

House Judiciary Panel passes Email Privacy Act 28-0

By

The House Judiciary Committee today passed the Email Privacy Act (H.T.699) by a 28-0 vote, a measure that would require a warrant for accessing anyone's electronic correspondence.

Cyber-criminals becoming increasingly professional

Cyber-criminals becoming increasingly professional

Report from Symantec finds that cyber-criminals are reaching same level of sophistication as nation-state hackers.

Former DOE staffer sentenced to 18 months for attempted spearphishing campaign

Former DOE staffer sentenced to 18 months for attempted spearphishing campaign

By

The three-year long legal saga of former Department of Energy worker Charles Harvey Eccleston ended with his being sentenced to 18 months in prison for attempting to spearphish his former co-workers.

Ramdo click-fraud malware uses evasive maneuvers to draw first blood from researchers

Ramdo click-fraud malware uses evasive maneuvers to draw first blood from researchers

By

A thorough dissection of the click-fraud malware Ramdo shows a constantly evolving threat whose capabilities now include traffic encryption, random domain generation and improved virtualization detection.

10% of IT pros never change their admin credentials

10% of IT pros never change their admin credentials

Most IT professionals (55 percent) make their users change their passwords more often than they change administrative credentials.

Judge approves settlement for Sony hacking case

Judge approves settlement for Sony hacking case

By

A U.S. district judge approved the settlement in a class action suit against Sony Entertainment.

WhatsApp end-to-end encryption completed

WhatsApp end-to-end encryption completed

By

WhatsApp integrated the Signal Protocol into its online messaging service, delivering on a promise to provide end-to-end encryption to its users.

FBI observes major uptick in business email compromise scams

FBI observes major uptick in business email compromise scams

By

Between October 2013 and February 2016, 17,642 global businesses collectively lost $2.3 billion to business email compromise scams, according to the FBI.

MedStar Health almost back online, but other hospitals hit

MedStar Health almost back online, but other hospitals hit

By

MedStar Health reported today that its systems are almost fully back online after suffering a cyberattack, but medical facilities remained targets with several more reporting cyber incidents.

Guccifer appears in U.S. courtroom following extradition

Guccifer appears in U.S. courtroom following extradition

By

Marcel Lehel Lazar, the alleged hacker known as Guccifer who helped validate reports of Hillary Clinton's use of a private email account as Secretary of State, appeared in a U.S. courtroom on Friday after extradition from Romania.

Pivotal Software latest hit with W-2 phishing attack

Pivotal Software latest hit with W-2 phishing attack

By

Pivotal Software was victimized in March with a phishing attack that grabbed employee W-2 information, joining a slew of other major corporations which have been similarly victimized.

Apple most referenced brand in phishing attacks, says Area 1

Apple most referenced brand in phishing attacks, says Area 1

By

Apple is the brand most used by scammers to trick their victims into opening a phishing email, according to a new study by the security firm Area 1.

Data on 1K staffers and students at Kentucky State University exposed

Data on 1K staffers and students at Kentucky State University exposed

By

Kentucky State University was hit with a data breach on March 22 when an employee, responding to an email supposedly from the school's president, sent off W-2s for employees and students.

MedStar Health's refusal to admit it was hit with ransomware is logical, experts

MedStar Health's refusal to admit it was hit with ransomware is logical, experts

By

MedStar Health's not acknowledging the type of attack that knocked its systems offline in all likelihood informed the world of exactly what it was trying to hide: It was a ransomware attack.

PowerWare ransomware uncovered, uses PowerShell for insertion

PowerWare ransomware uncovered, uses PowerShell for insertion

By

Cyber crooks once again found a way to use a Microsoft product to victimize the public.

Ransomware suspected in MedStar Health attack, experts say

Ransomware suspected in MedStar Health attack, experts say

By

MedStar Health is still offline and using paper to transact its business after a cyber attack forced the non-profit healthcare provider to take its network offline.

FBI cracks iPhone, no longer needs Apple's assistance

FBI cracks iPhone, no longer needs Apple's assistance

By

The Justice Department has halted its attempt to force Apple to break into the iPhone used by one of the San Bernardino terrorists after the FBI managed to gain access on its own.

Survey says companies unprepared for ransomware, phishing attacks

Survey says companies unprepared for ransomware, phishing attacks

By

Most security pros are not sure their company could fully recover its data if hit with a ransomware attack, nor are they confident the firm's executives could spot a phishing attack, Tripwire found in a new survey.

3,000 Tidewater Community College workers victimized in W-2 scam

By

Tidewater Community College (TCC) in Norfolk, Va., reported the tax information of all its employees was hijacked in a spear phishing scam.

Google enhances Gmail security to thwart malicious links, state-sponsored cyberattacks

Google enhances Gmail security to thwart malicious links, state-sponsored cyberattacks

By

Google yesterday announced several new protections for its Gmail service, aimed at protecting users from malicious links and government-sponsored cyberespionage.

The number of W-2 phishing scams pile up in early  2016

The number of W-2 phishing scams pile up in early 2016

By

In the first few months of 2016, dozens of businesses have come under spear phishing attacks seeking employee tax data.

"Beautiful" ransomware arrives

"Beautiful" ransomware arrives

By

Maktub Locker ransomware is targeting its victims with a spam campaign that attempts to trick people into thinking they are getting a terms-of-service update when in fact the attached document contains malware.

Brazilian trojan arrives disguised in PNG image

Brazilian trojan arrives disguised in PNG image

By

A new trojan in the wild has been detected that conceals itself in a PNG image.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US