Please turn on your JavaScript for this page to function normally.
private browsing
Private browsing is not that private, but it can be

Private, “Incognito mode” browsing sessions are not as foolproof as most users believe them to be. “After a private session terminates, the browser is …

phishing
Which phishing messages have a near 100% click rate?

Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rates decrease. For …

certificate
Counterfeit digital certificates for sale on underground forums

Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and …

gap
Trend Micro fixes serious vulnerabilities in Email Encryption Gateway

Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a …

Intel CPU
Intel releases Spectre 2 microcode updates for Kaby Lake, Coffee Lake, Skylake

Intel has released to OEMs a new set of Spectre firmware updates. They include microcode for Kaby Lake, Coffee Lake, and Skylake processors. “This represents our 6th, …

BEC scams
BEC scammers actively targeting Fortune 500 companies

Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is …

AWS
To prevent data breaches, AWS offers S3 bucket permissions check to all users

Amazon Web Services (AWS) has announced that all customers can now freely check whether their S3 buckets are leaking stored data. “Previously available only to Business …

artificial intelligence
Afraid of AI? We should be

Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious …

dark
The advent of GDPR could fuel extortion attempts by criminals

The number of exploit kit attacks is, slowly but surely, going down, and malware peddlers are turning towards more reliable tactics such as spam, phishing, and targeting …

industry
US sets up dedicated office for energy infrastructure cybersecurity

The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on …

SWIFT
Russian, Indian banks lose millions to hackers

The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used …

general virtual digital
Dell EMC plugs critical bugs in VMAX enterprise storage offerings

Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as …

Don't miss

Cybersecurity news