Healthcare sector reports greatest number of security incidents
McAfee Labs saw healthcare surpass public sector to report the greatest number of security incidents in Q2, while the Faceliker Trojan helped drive quarter’s 67% increase in …
Shocker? Companies still unprepared to deal with ransomware
Companies and government agencies are overwhelmed by frequent, severe ransomware attacks, which have now become the #1 cyber threat to organizations, according to Crowd …
Showtime’s Web sites roped visitors’ CPU into mining cryptocurrency
Here’s the latest good reason for users to block JavaScript: if you don’t, your computer’s CPU power could be used to mine cryptocurrency without your …
XPCTRA financial malware leaves no stone unturned
A Trojan that has previously been only stealing users’ banking credentials has been modified to do much more than that. This new variant, dubbed XPCTRA, can also steal …
Three out of four DDoS attacks target multiple vectors
Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. Distribution of DDoS attack vectors The …
macOS High Sierra is now available
Apple macOS High Sierra is now available as a free update from the Mac App Store, and it supports all Macs introduced in late 2009 or later. Apple File System (APFS) APFS is a …
Industry reactions to the Deloitte cyber attack
Deloitte has been targeted in an attack that compromised the emails and plans of some of its clients. Here are some of the industry comments Help Net Security received …
Android unlock patterns are a boon for shoulder surfing attackers
The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …
Large DDoS attacks over 50 Gbps have quadrupled between 2015 and 2017
Organizations are experiencing an increase in the magnitude of DDoS attacks, with the average size of attacks over 50 Gbps quadrupling in just two years, according to A10 …
Standard cloud migration models are insufficient when moving mission critical workloads
Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …
Criminal hacking: Top technology risk to health, safety and prosperity
Americans believe criminal hacking into computer systems is now a top risk to their health, safety and prosperity. Criminal hacking, a new ESET survey finds, outranks other …
Week in review: CCleaner compromise, Optionsbleed, and Linux devices sending out spam
Here’s an overview of some of last week’s most interesting news and articles: Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco There is a new …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways