Featured

Secure Your Zoom Account With Two-Factor Authentication

Two-factor authentication, however, provides an additional safety net – even if your password falls into the hands of cybercriminals. That’s because 2FA turns logging...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks

North Korea’s BeagleBoyz team resumed its efforts to target banks worldwide with fraudulent money transfers and ATM cash outs...

How Facebook And Other Sites Manipulate Your Privacy Choices

IN 2010, THE Electronic Frontier Foundation was fed up with Facebook’s pushy interface. The platform had a way of coercing people into giving up...

Facebook Buries News That Millions Of Instagram Passwords Were Stored In...

Update came as world's attention was turned to attorney general William Barr's statement on Trump revelations...

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

Cybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage...

Fake DNS Security Upgrade Scam Compromises WordPress Websites

In late June, Naked Security received a scam email that pretended to originate from WordPress.com. It leveraged this cover to inform the recipient that...

More Evil: A Deep Look At Evilnum And Its Toolset

ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in...

Amazon ‘Thwarts Largest Ever Ddos Cyber-Attack’

Amazon says its online cloud, which provides the infrastructure on which many websites rely, has fended off the largest DDoS attack in history. Distributed...

New Cybersecurity Recommendations For US Government Target Iot, Social Media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the...

Breaking Up With Your Abusive Ex’s Tech

Here are some key privacy protection measures you can take to get bad people out of your digital life...

Utah Tech CEO Jailed for Possessing Thousands of Files Depicting Child...

he 40-year-old one-time CEO of a Utah tech company is serving a custodial sentence after downloading over 13,000 images of child sexual abuse, bestiality,...

Phishing Campaigns Leverage Google Firebase Storage

New phishing campaigns tracked by Trustware deploy schemes that harvest credentials by taking advantage of “the reputation and services” of the Google Cloud’s Firebase...

RATicate Group Hits Industrial Firms With Revolving Payloads

A new threat group uses NSIS as an installer to target industrial companies with revolving payloads, including LokiBot, FormBook, BetaBot, Agent Tesla and Netwire...

This Sneaky Phishing Technique Is Tricking Employees Into Installing Malware Or...

Security researchers are warning users about the increase in a particular phishing technique that tricks unsuspecting employees into performing malicious activities. This can include...

You Have 4 Days To Submit Your Equifax Data Breach Claim...

You have just a handful of days to file your claim if you're among the 147 million people whose data was exposed in the...

How AI And Cybersecurity Will Intersect In 2020

So much of the discussion about cybersecurity's relationship with artificial intelligence and machine learning (AI/ML) revolves around how AI and ML can improve security...

Aussie P&N Bank Suffers Data Breach

The Australian P&N Bank reported a data breach that exposed detailed and sensitive financial information on an unspecified number of customers. Access was gained...

‘Fleeceware’ Apps Downloaded 600M Times From Google Play

New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store. Google has made a...

How SASE Improves Security Information, Event Management

Earlier this month, secure access service edge (SASE) vendor Cato announced a way for mid-size companies to deploy SIEM at a fraction of the...

Podcast: Meeting The Security Threats Of 2020

Bret Hartman has been in cybersecurity since he was a young Air Force lieutenant. Followed by stints at the NSA, IBM, and EMC. Along...

Windows Vulnerability: Researchers Demonstrate Exploits

A day after the U.S. National Security Agency disclosed a vulnerability that could affect the cryptographic operations in some versions of Microsoft Windows, security researchers...

Embedding Security, The Right Way

As organizations proceed to move their processes from the physical world into the digital, their risk profile changes, too – and this is not...

Kadena Launches Chainweb, A Hybrid Platform To Connect Public, Private Blockchains

Brooklyn-based startup Kadena has launched a hybrid blockchain that can scale horizontally, enabling multiple electronic ledgers to talk to each other via smart contracts – and...

Pocs For Windows Cryptoapi Bug Are Out, Show Real-Life Exploit Risks

Proof-of-concept exploit code is now available for the Windows CryptoAPI spoofing vulnerability tracked as CVE-2020-0601 and reported by the National Security Agency (NSA), just...

Big Prize Money Offered In Indian IT Ministry Cybersecurity Startup Challenge

India’s Ministry of Electronics & Information Technology (MeitY) and Data Security Council of India (DSCI) today launched the Cyber Security Grand Challenge, which will award INR 3.2 crore (approximately...

James Sample Named CSO At Xcel Energy

Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program,...

Why Multicloud Security Is Your Next Big Challenge

Most companies who use cloud services to deploy applications, websites, databases and related solutions have a problem. While each cloud vendor may have a...

Pussycash Adult Webcam Data Breach Exposes Highly Sensitive Data Of Models

Thousands of adult webcam models have had their intimate details exposed online after a data breach involving the live webcam porn network, PussyCash. Those...

Insights About The First Five Years Of Right To Be Forgotten...

The “Right to be Forgotten” (RTBF) is a landmark European ruling that governs the delisting of personal information from search results. This ruling establishes...
2,634FansLike
3,412FollowersFollow
572FollowersFollow

How Does Smart Glasses Work