3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …
IT spending to slow down in 2016
Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …
Ransomware offers customer support via chat
PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …
Email security still an afterthought
Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …
Application downtime costing enterprises $16 million each year
Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …
Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …
W3C launches effort to replace passwords
The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …
E-commerce web apps vulnerable to hijacking, database compromise
High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …
Is your WordPress site being misused for DDoS attacks?
Many WordPress websites are still being misused to perform layer 7 DDoS attacks against target servers, even though preventing them from participating in these attacks is as …
Hollywood hospital pays ransom to get their computers, files back
The Hollywood hospital whose systems have been infected with ransomware has paid $17,000 to get the decryption key from the criminals, and is operating normally once again. …
Fighting malware monetization and application vulnerabilities
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …
Why a single point of failure should be your primary concern
Many organizations are transitioning to digital systems, which has increased the dependency on cloud service providers, web hosting platforms, and other external services. …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online