Remote working on the rise despite security concerns
Remote working is increasing in popularity as 96 percent of surveyed organisations now permit remote/mobile working, with 98 percent stating that it is advantageous to their …
Credential manager system used by Cisco, IBM, F5 has been breached
Pearson VUE, a provider of computer-based assessment testing for regulatory and certification boards, has announced that its Credential Manager system (PMC) has been …
Zero detection GlassRAT operated undetected for years
RSA Research has unearthed another Remote Access Tool/Trojan (RAT) used in cyber espionage campaigns. Dubbed GlassRAT, it has the usual capabilities of this type of malware: …
Dell shipped computers with root CA cert, private crypto key included
All desktop and laptops shipped by Dell since August 2015 contain a root CA certificate (eDellRoot) complete with the private cryptographic key for it, opening users to the …
75% of companies experienced a fraud incident in the past year
Three quarters of companies (75%) have fallen victim to a fraud incident in the past year, a rise of 14 percentage points in just three years, according to Kroll.The findings …
Two arrested for helping malware developers evade AV software
Two suspects have been arrested on suspicion of operating a website offering services to help criminals overcome and avoid anti malware software, following a joint …
Network protocol analyzer Wireshark 2.0 released
Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …
Most consumers concerned about becoming victims of online crime
Globally, 62 percent of consumers believe it’s more likely their credit card information will be stolen online compared to only 38 percent who think it’s more likely they will …
Analytics services are tracking users via Chrome extensions
It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …
How malware peddlers trick users into enabling Office macros
A week ago, SANS ISC handler and freelance security consultant Xavier Mertens analyzed a Word document containing malicious macros, and unearthed in it a VBA function that …
New law allows French police to seize and search electronic devices without a warrant
In the wake of the Paris attacks, the French Senate passed on Friday a bill that extends the state of emergency declared after the attacks to three months.The bill expands …
Man stole special agent’s identity, executed a complex identity theft scheme
Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …
Featured news
Resources
Don't miss
- The long conversations that reveal how scammers work
- Metis: Open-source, AI-driven tool for deep security code review
- How to cut security tool sprawl without losing control
- Product showcase: Proton Pass, a password manager with identity protection
- Internet slowly recovers after far-reaching Cloudflare outage