In the past two weeks, we have seen two big encryption issues arise: key reinstallation attacks, called KRACKs; and “Return of Coppersmith’s Attack,” called ROCA. Many CEOs, CIOs, and CISO/CSOs are asking, as they must, “Are we protected?”...Show More Summary
APT28 threat group is moving fast in the hope that targets haven't yet installed a recently released patch to fix the recently uncovered exploit
Between natural disasters and cyberattacks, IT managers have a big job ensuring business continuity. In this guide, we offer ten key strategies to help your organization weather Mother Nature's wrath and cyberattackers' latest weapo...
Supply-chain attack saw data-stealing Proton RAT loaded into legitimate downloads of Elmedia Player and Folx applications by Eltima Software.
Google brings the bug bounty vulnerability research model to Android apps in the Play Store.
The annual report from the Australian Criminal Intelligence Commission has revealed its ACORN joint venture received 47,873 reports relating to cybercrime activity during the 12-month period.
'Magniber' ransomware could potentially be an experiment by people behind the Cerber ransomware family.
As companies amass more data, they're looking for flexibility in how they identify and protect sensitive information, Google says.
Regional officials try to find a way to help police without weakening security for everyone.
The source of the recording said Facebook's senior management and executives were apathetic to matters of cybersecurity. Facebook's security chief said he used one of the remarks "as a figure of speech."
Malicious Minecraft skin downloads can harness your device for DDoS attacks.
The office led by Information and Privacy Commissioner Timothy Pilgrim received 114 voluntary data breach notifications, 35 mandatory digital health data notifications, and 2,494 privacy-related complaints during the 12-month period...
Given how the NSA has tried to hack anything it can, many looked to one top secret leaked document for answers.
On October 12, researcher Mathy Vanhoef announced a set of Wi-Fi attacks that he named KRACKs, for key reinstallation attacks. These attack scenarios are against the WPA2 authentication and encryption key establishment portions of the most recent set of protocols. Show More Summary
In May, McAfee surveyed more than 700 IT and security professionals around the world to better understand how threat hunting is used in organizations and how they hope to enhance their threat hunting capabilities. You can read the full...Show More Summary
It's another IoT security flaw - attackers can hack smartwatches to monitor the wearer's location, eavesdrop on conversations or even communicate with the child.
CERT updates its list of potentially worrisome innovations.
Ed Bott's extensive collection of Windows 10 tips, organized by category. This page includes the most popular tips for networking and security.
Google has rolled out two new tools to combat phishing, and upped Gmail security.
New payload bundled within Necurs botnet attacks allows those carrying out malicious campaigns to check if they're working and improve updates.