Please turn on your JavaScript for this page to function normally.
puzzle
What’s on the horizon for security and risk management leaders?

By 2022, cybersecurity ratings will become as important as credit ratings when assessing the risk of business relationships, Gartner analysts believe. They also predict that, …

https
Why phishers love HTTPS

As more and more sites switch to HTTPS, the number of phishing sites hosted on HTTPS domains is also increasing. “In the third quarter of 2017, we observed nearly a …

DDoS
DDoS attackers increasingly targeting cryptocurrency exchanges

The extraordinary volatility of the price of bitcoin has spurred speculators to employ a wide variety of tricks to make it swing between extremes, so that they can take …

prison
Hacker who tried to spring friend from jail will end up in prison himself

A Michigan man by the name of Konrads Voits pleaded guilty to hacking Washtenaw County’s computer network and changing the Washtenaw County Jail records, with the intent …

PayPal
Phishers target panicking PayPal users with fake “failed transaction” emails

With the end-of-the-year holidays quickly approaching and many users worrying whether the gifts they bought online will be delivered in time for the festivities, an email from …

bitcoin
How secure are cryptocurrency mobile apps?

Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? …

SF
Stealthy in-browser cryptomining continues even after you close window

In-browser cryptocurrency mining is, in theory, a neat idea: make users’ computers “mine” Monero for website owners so they don’t have to bombard users …

professional
UK shipbroker Clarksons refuses to pay hackers ransom for stolen data

London-based shipbroking firm Clarksons has suffered a data breach and refuses to pay the attackers to prevent the stolen data from being publicly released. About the …

Cisco WebEx
Triggered via malicious files, flaws in Cisco WebEx players can lead to RCE

Cisco has plugged six security holes in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files that could be exploited …

healthcare
OpenEMR flaw leaves millions of medical records exposed to attackers

A vulnerability in the free, open source electronic medical record and medical practice management software OpenEMR can be exploited to steal patients’ medical records …

macOS
Critical macOS High Sierra bug allows easy root access

If you’re using a Mac, and are running macOS High Sierra, drop everything that you’re doing and go and apply this update. Why? What’s happening? Turkish …

Android
Tizi backdoor rooted Android devices by exploiting old vulnerabilities

Google has discovered and removed from Google Play a number of apps that contained the Tizi backdoor, which installs spyware to steal sensitive data from popular social media …

Don't miss

Cybersecurity news