|Filed Under:||Technology / Security|
|Posts on Regator:||1582|
|Posts / Week:||5.4|
|Archived Since:||February 3, 2010|
Microsoft has revised its Bug Bounty schemes with improved rewards, bonuses and the addition of new valid programs.
Researchers at Black Hat USA have disclosed critical SCADA/ICS vulnerabilities in switches actively used in industrial control management systems, such as substations, factories, refineries, ports, and other areas of industrial automation.
The group has set up at least 100 watering hole attacks to ensnare victims in the defense, education and political sectors.
Researchers outline how hackers can attack your smartphone to steal your fingerprint on a "large scale" -- without anybody noticing.
Starting Friday, infamous hacker conference DEF CON enters its 23rd year with talks that show you how to fake your death, crack a safe, hack a Tesla, mess with Yubikey, and much more.
The Bunitu Proxy Trojan has moved from malvertising to spreading through virtual private networks to make money for its operators.
Take a plunge into the world of cybersecurity with these recommended reads.
The open-source app is available to download for free.
The Terracotta VPN network is made up of compromised Microsoft Windows servers.
The agency is warning local law enforcement of the emerging threat that drones pose.
The latest version of the exploit kit is active and has infected 1.3 million people.
The partnership will expand the use of website isolation techniques to keep the enterprise safe from malware.
A cautionary tale in being patient, and not skipping the line.
A Google security research paper published last week detailed the best safety practices that hundreds of security experts recommend. Antivirus software wasn't at the top of the list.
Businesses are being threatened with network flooding attacks if they fail to pay a ransom.
Karpeles is accused of tampering with financial records to inflate his bank account by $1 million -- and a former employee has ended his silence over the Mt. Gox debacle.
A hacker is demanding $15,000 in payment or they plan to release customer details online.
If you were waiting for Congress to act, now is the time to go grab yourself some popcorn.
Can "circuit fingerprinting" reveal the true location of Tor websites and services?
Notable security news items for the week ending July 31, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.