Successful strategies to avoid frequent password changes
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …
New ransomware emulates CryptoLocker, CryptoWall
Ransomware has proven to be such a successful money-making model, that a new variant is discovered or a new delivery campaign is spotted nearly every day. Security experts …
Infographic: Major security skills shortages
Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …
Personal info of 4.5 million patients stolen in US hospital group breach
Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …
Research unveils improved method to let computers know you are human
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …
Gyroscopes on Android devices can be used to eavesdrop on users’ conversations
If you think that denying an app permission to use your phone’s microphone is enough to prevent it from listening in on your conversations, think again, as a group of …
Android ransomware masquerades as Symantec mobile AV
A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …
ReversingLabs extracts malicious files from network traffic
ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …
Whitepaper: Social networking and security risks
The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …
Week in review: Hackers don’t worry about repercussions, malware targets iOS devices, Nest thermostat as a spying device
Here’s an overview of some of last week’s most interesting news, interviews, videos, podcasts, reviews and articles: The art and science of detecting emerging …
New Gameover Zeus variant steadily rebuilds downed botnet
It’s already widely known that the Gameover Zeus gang, whose activity has been temporarily foiled by a successful multi-national law enforcement takedown in June, is …
PGP is fundamentally broken, says crypto expert
“It’s time for PGP to die,” Matthew Green, noted cryptographer and research professor at Johns Hopkins University, opined in a recent blog post. …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE