The automation and industrialization of cyber attacks
A new Imperva report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive …
Tor Project claims FBI paid university researchers $1m to unmask Tor users
Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …
Endpoint security lags in spite of vulnerabilities
Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …
Buhtrap gang distributes malware through Ammyy’s remote desktop software
ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …
Digitally signed spam campaign spotted delivering malware
We’ve all heard about digitally signed malware, but have you ever been targeted with a digitally signed spam email? Someone did, and has shared the signature notice with …
Rooted, Trojan-infected Android tablets sold on Amazon
If you want to buy a cheap Android-powered tablet, and you’re searching for it on Amazon, the best thing you can do is carefully read all the negative reviews you can …
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
Ivan Ristic is well-known in the information security world, and his name has become almost a synonym for SSL Labs, a project he started in early 2009. Before that, he was …
Three indicted in largest theft of customer data from a U.S. financial institution in history
On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …
Long-term skills shortage drives tech salaries up
Four in 10 technologists changed jobs this year, according to the Harvey Nash Technology Survey. Respondents listed a good salary as their main motivator (77 percent) behind …
How the threat landscape will change by 2020
McAfee Labs’ five year look ahead attempts to predict how the types of threat actors will change, how attackers’ behaviors and targets will change, and how the industry …
6.4 billion connected things will be in use in 2016
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …
Comcast resets passwords for 200,000 users after login credentials go on sale
Over the weekend, someone has been peddling a batch of 590,000 email address/password combinations allegedly belonging to Comcast customers. The price set for the lot was 3.23 …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days