Blog Profile / ZDnet: Security

Filed Under:Technology / Security
Posts on Regator:2082
Posts / Week:28.3
Archived Since:August 24, 2016

Blog Post Archive

Hackers are using recent Microsoft Office vulnerabilities to distribute malware

Malware can steal passwords, bitcoin wallets, software keys, carry out DDoS attacks and more - and a campaign distributing it is targeting telecommunications, insurance and financial services

Ransomware: Why the crooks are ditching bitcoin and where they are going next

The popularity of bitcoin is creating problems for criminals dealing in ransomware -- and some are already casting their gaze towards a less volatile cryptocurrency.

Triton exploited zero-day flaw to target industrial systems

Schneider Electric has revealed how the Trojan managed to disrupt core industrial systems in the Middle East.

Dridex banking Trojan compromises FTP sites in new campaign

The Trojan is back with a new technique to avoid detection by email gateways.

?Notifiable Data Breaches scheme: Getting ready to disclose a data breach in Australia

Australia's Notifiable Data Breaches scheme will come into force next month. Here is what it means and how it will affect organisations, and individuals, in Australia.

Windows 10 Meltdown-Spectre patch: New updates bring fix for unbootable AMD PCs

AMD PCs can now install Microsoft's Windows update with fixes for Meltdown and Spectre and the bug that caused boot problems.

This Android malware wants to steal your Facebook login and bombard you with ads

Researchers find 53 apps distributing malware for stealing Facebook credentials - some of which have been active since April 2017 and have been downloaded over 100,000 times.

Google awards researcher over $110,000 for Android exploit chain

The bug bounty highlighted serious security issues in the Pixel smartphone.

Megaport continues double digit revenue growth citing IBM Cloud partnership

Megaport has clocked AU$4.68 million in quarterly revenue, saying its IBM Cloud partnership will allow it to provide scalable connectivity to support blockchain, artificial intelligence, analytics, and IoT.

Google intros Security Center tool for G Suite

Security center aims to bring together analytics, insights and recommendations about an organization's data security.

Cloud computing: Why a major cyber-attack could be as costly as a hurricane

The economic costs of a large cyber-attack could be as large as the impact of a major natural disaster.

Want more privacy online? ProtonMail brings its free VPN to Android

ProtonVPN comes to Android, promising no malware, no ads, and no selling of user data.

The top 10 security challenges of serverless architectures

Broken authentication and privileged access without cause are among the most common security concerns.

Satori botnet successor targets Ethereum mining rigs

A variant of the botnet targets rigs to covertly replace their wallet addresses.

BitConnect winds up cryptocurrency exchange operations, BCC crashes

The closure of the controversial service follows warnings from US regulators and has raised the ire of lenders which consider the move an exit scam.

Cyber-attacks are a top three risk to society, alongside natural disaster and extreme weather

A report has warned that ransomware, Internet of Things hacks, and industrial attacks could be almost as big a problem as natural disasters and extreme weather.

Amazon won't say if it hands your Echo data to the government

The retail, cloud, and device giant stands as the least transparent of transparent tech companies.

$400,000 stolen in Lumens BlackWallet theft

Another day, another theft in the world of cryptocurrency wallets.

Suspected LeakedSource operator charged in Canada

The for-profit breach notification site offered access to approximately three billion identity records.

Copyright © 2015 Regator, LLC