Steve Ragan

Senior Staff Writer

Prior to joining the journalism world in 2005, Steve Ragan spent 15 years as a freelance IT contractor focused on infrastructure management and security. He's a father of two and rounded geek with a strong technical background.

Contrast Security responds to OWASP Top 10 controversy

R2Games compromised again, over one million accounts exposed

R2Games compromised again, over one million accounts exposed

Online gaming company Reality Squared Games (R2Games) has been compromised for the second time in two years, according to records obtained by the for-profit notification service LeakBase. The hacker who shared the data with LeakBase...

Secure card maker Plastc Inc. considering Chapter 7 bankruptcy, halts operations

Secure card maker Plastc Inc. considering Chapter 7 bankruptcy, halts operations

Early supporters of Plastc, the E-Ink and touchscreen smart card that offered a number of security features, got some bad news on Thursday. Plastc Inc. is exploring options for Chapter 7 Bankruptcy protection, and none of the...

Job seekers on ZipRecruiter being targeted by scams via email and text

Job seekers on ZipRecruiter being targeted by scams via email and text

Right now, thousands of people are looking for a new job online. Some of them just want a change, but others are looking for a stable income to support themselves and their families. Scammers are targeting job seekers with precision,...

McAfee LinkedIn page hijacked

McAfee LinkedIn page hijacked

On Sunday evening, the LinkedIn page for McAfee was hijacked by a single person or an unknown number of individuals who apparently watched Twitter for reactions. The business page was defaced with random remarks, and at one point made...

New report examines the weaknesses of industrial environments

New report examines the weaknesses of industrial environments

A new report from FireEye examines the attack surfaces shared by a number of industrial enterprise operations, including electric utilities, petroleum companies, and manufacturing organizations. The six weaknesses outlined by FireEye...

Scammers Phishing for financial credentials on Twitter

Scammers Phishing for financial credentials on Twitter

Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to...

Scottrade Bank data breach exposes 20,000 customer records

Scottrade Bank data breach exposes 20,000 customer records

Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to the public. The database itself...

Android version of iOS malware used in targeted attacks discovered

Android version of iOS malware used in targeted attacks discovered

Researchers at Lookout and Google have identified an Android variant of custom malware originally detected in targeted attacks against iOS last year. Called Pegasus, the malware is used against dissidents in multiple countries, and...

API flaws said to have left Symantec SSL certificates vulnerable to compromise

API flaws said to have left Symantec SSL certificates vulnerable to compromise

Over the weekend, Chris Byrne, an information security consultant and instructor for Cloud Harmonics, published a post to Facebook outlining a serious problem with the processes and third-party API used to deliver and manage Symantec...

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US...

Cisco to patch 300 devices against flaw found in CIA archives

Cisco to patch 300 devices against flaw found in CIA archives

After digging through the CIA archives released by WikiLeaks, Cisco says they've discovered a previously unknown flaw impacting 318 switch models. The bug, which the CIA has known about for an undetermined amount of time, can allow a...

Load More