All Blogs / Technology / Security / Popular


Hackers grab 1.1 million CareFirst members' data in "sophisticated" cyberattack

Initial evidence suggests names, birth dates, and email addresses, but not credit card data.

Enterprise, cloud services exposed as vulnerable to Logjam

An analysis of the security flaw claims over 500 cloud providers are vulnerable -- and almost all average enterprise firms may currently be at risk.

Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations

Pranksters are planting recorders around New York city, retrieving the tapes, and embedding the resulting audio on their website. The post Anti-NSA Pranksters Planted Tape Recorders Across New York and Published Your Conversations appeared first on WIRED.

5 Ways We Must Regulate Drones at the US Border

There are ways that government drones at the border could benefit society, but we must make sure there are limits. The post 5 Ways We Must Regulate Drones at the US Border appeared first on WIRED.

NetUSB flaw leaves 'millions' of routers, IoT devices vulnerable to hacking

The flaw can be exploited to conduct denial-of-service attacks or remote hijacking.

Logjam security flaw leaves top HTTPS websites, mail servers vulnerable

The new attack can be used to spy upon encrypted connections used by tens of thousands of HTTPS websites and mail servers.

Poltergeist Reviews Are In

Was this remake really necessary? Film Poltergeist steven spielberg

Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool

Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. Show More Summary

Understanding the Scope of Venom (CVE-2015-3456)

In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe...Show More Summary

DDoS attacks are getting worse, as attackers shift tactics and targets

Attackers are using smaller bandwidth attacks to last longer, and do more damage.

In defense of ad-blockers, a vital line of defense for the privacy conscious

Ad-blockers harm the internet economy. But they can also help save your privacy. Which do you value more?

Safari, Chrome hit by address bar spoofing bugs

Security researchers warn that it may make phishing far more effective.

Most companies take over six months to detect data breaches

New research suggests the average financial or commercial business face multiple attacks per month -- and it takes months for data breaches to be detected.

Majority of Americans "concerned" by NSA domestic surveillance

Almost two-thirds of voters believe the Patriot Act should not be reauthorized in its current form.

Trojanized version of PuTTY client discovered online

A version of the client has been tampered to steal user data.

Enterprise employees choose adult content, app downloads over security

Research suggests despite knowing otherwise, workers worldwide regularly ignore IT policies and place businesses at risk.

Apple, Google urge Obama to reject smartphone backdoor proposals

A multitude of technology firms hope to stop legislation which would allow law enforcement access to data stored in mobile devices.

RadioShack sale of customers' personal data may be unlawful, warns FTC

RadioShack promised not to sell the data, and there's a past precedent for such a case.

Malware Spreads Through Facebook Tag Scam

Intel security has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving using new spreading mechanisms. A few days ago, we came across a Facebook post with this subject: [Username]...Show More Summary

Copyright © 2015 Regator, LLC