All Blogs / Technology / Security / Popular


Leading Enterprisewide Transformation – an Interview with Gartner

Introduction In this interview, Patty Hatter shares with Gartner Vice President Michael Leckie the story of how she lead the charge on a series of high-value, enterprise-wide initiatives to enable new business capabilities that haveShow More Summary

The Latest Hack Lesson? Great Defense Is Never Enough

Let’s stop talking about “breach prevention," and move the public discourse toward breach preparation and understanding, data governance and smart data privacy practices. We need these discussions like never before. The post The Latest Hack Lesson? Great Defense Is Never Enough appeared first on WIRED.

Severe iOS bug prompts iCloud password theft

A researcher has unveiled a proof-of-concept demonstrating how easily an unpatched vulnerability can be exploited to steal iCloud account passwords.

Europol arrests 49 alleged cybercriminals in financial fraud crackdown

The group of cybercriminals are accused of targeting corporations to intercept payment requests and make off with the funds.

Mozilla ramps up bug bounty payments

If you submit a Mozilla Firefox security flaw in the future, you can expect a "dramatic" payment increase.

Chris Hemsworth Joining the Cast of the Next Ghostbusters

Here comes the hammer... Film ghostbusters Paul Feig Bridesmaids Annie Potts Chris Hemsworth

Jurassic World: Official Reviews Are In

And the verdict is... Film Jurassic Park Jurassic World Chris Pratt

‘Evoltin’ POS Malware Attacks via Macro

Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Show More Summary

iOS 9 to include another privacy feature: allowing ad-blockers

Ad-blockers can protect a user's privacy by preventing browser tracking.

BREAKING: SCANEX Reported Greenpeace Vessel Arctic Sunrise to FSB, Then Sought To Cover It Up

On September 18, 2013 Greenpeace protestors left the Arctic Sunrise on inflatable motor boats and headed towards Gazprom's oil platform, the Prirazlomnaya, to protest drillings' which threaten the pristine Arctic environment. The Russian Coast Guard was informed of the attempted protest action and sent commandos to intercept them. Show More Summary

Kaspersky Finds New Nation-State Attack—In Its Own Network

Kaspersky says the attackers became entrenched in its networks some time last year. The post Kaspersky Finds New Nation-State Attack—In Its Own Network appeared first on WIRED.

Sen. McCain: How to Get Silicon Valley to Help the Pentagon

The Pentagon confronts an emerging innovation gap. The only way to catch up is by accessing innovation that is much more likely to come from Silicon Valley than Washington. The post Sen. McCain: How to Get Silicon Valley to Help the Pentagon appeared first on WIRED.

Poweliks Trojan goes fileless to evade detection and removal

The registry-based threat avoids creating PC files and exploits zero-day threats to hijack compromised computers.

RAND study: Cyber-defense must change course, or else

RAND today released the results of its multiphased study on cybersecurity's future, The Defender's Dilemma, delivering a frightening snapshot of defenders lost at sea.

Adobe issues patch update for 13 security vulnerabilities in Flash Player

Adobe's latest security update includes fixes for memory leak, memory corruption and remote code execution issues.

US tech giants to "far exceed" $35 billion loss in NSA fallout

"Foreign customers are shunning US companies," says a new independent report.

White House pushing federal agencies to adopt HTTPS encryption

About one-third of all federal websites offer HTTPS, but the White House said that's not enough.

Size doesn't mean secure: How prepared is the enterprise for hackers?

Do you believe large corporations are the most well-prepared for cyberattacks? New research might make you think twice.

Hackers control medical pumps to administer fatal doses

As our medical devices become connected, new hacking threats emerge -- and some of them are potentially life-threatening.

Syrian Electronic Army hacks into US Army website

The US Army website was defaced as a result of the SEA's latest political hacking campaign.

Copyright © 2015 Regator, LLC