
UAC bypass attack on Windows 10 allows malicious DLL loading
Security researchers Matt Graeber and Matt Nelson have discovered a way to run a malicious DLL on Windows 10 without the User Account Control (UAC) springing into action and …

What a Chief Strategy Officer does, and why you need one
Seasoned IT security expert and former Gartner analyst Richard Stiennon recently became the Chief Strategy Officer for the Blancco Technology Group. It was the perfect …

Researchers discover 110 snooping Tor nodes
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …

Critical holes in Micro Focus Filr found, plugged
Popular enterprise file management and collaborative file sharing solution Micro Focus Filr sports half a dozen security flaws, most of which can be exploited – either …

Law enforcement and IT security companies join forces to fight ransomware
Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …

Warframe, Clash of Kings players’ info stolen after forum hacks
Two new website hack/ user data theft combos have been revealed last week, and the victims are players of popular mobile real time strategy game Clash of Kings and online …

Industry collaborates on automotive cybersecurity best practices
New technology has paved the way for extraordinary advancements in vehicle safety, emissions reduction, and fuel economy. Today’s vehicles do more to keep drivers secure …

Week in review: Pokémon GO, flawed code hooking engines, Ubuntu Forums hacked again
Here’s an overview of some of last week’s most interesting news and articles: Preparing for new EU cybersecurity rules and regulations The Network and Information …

Decrypter for Locky-mimicking PowerWare ransomware released
Palo Alto Networks’ researchers have created a decrypter for the variant of the PoshCoder ransomware that imitates the Locky ransomware. Dubbed PowerWare by the …

Snowden wants you to know when your phone is revealing your location
NSA whistleblower Edward Snowden and hardware hacker Andrew “Bunnie” Huang have possibly come up with a solution for warning users when their phones are revealing their …

Victims of Tinder safe dating scam can lose a lot of money
Users of Tinder, the massively popular location-based dating app, are being targeted with a clever scam that may make them lose over a $100 per month. The Tinder safe dating …

Wi-Fi hack experiment conducted at Republican National Convention site
Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices