Security

Security | News, how-tos, features, reviews, and videos

Phishing trends

Talking phishing campaigns with @PhishingAI's Jeremy Richards | Salted Hash, Ep. 42

All this week, while we’re on location in Las Vegas, Salted Hash has been discussing phishing and the impact it has had on the public. Today, we’re getting an insider view on how @PhishingAI operates, and learning about a recent...

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Bug bounty program

Bug bounties offer legal safe harbor. Right? Right?

Bug bounties are all the rage, but many programs do not offer legal safe harbor to good-faith security researchers who wish to report security issues. Caveat bug finder.

binary code, magnifying lens, skull and crossbones

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

artificial intelligence / machine learning / network

Weaponized AI and facial recognition enter the hacking world

Your face could trigger a DeepLocker AI-powered malware attack or be used by Social Mapper to track you across social media sites.

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

phishing fishing lure bait binary hack security breach

Inside Dropbox and Microsoft Office phishing attacks | Salted Hash, Ep. SC03

Today on Salted Hash, we're going to look at a phishing attack that targeted me directly. It's got a few interesting elements, including a weak attempt to spoof an HTTPS connection, and a sort of hybrid lure, which starts as Dropbox...

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

ajit pai fcc

FCC lied about DDoS attack during net neutrality comment process, blames former CIO

FCC Chairman Ajit Pai says a DDoS attack did not take out the net neutrality comment site, and he blames the former FCC CIO for providing incorrect information.

phishing threat
Awareness

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

20161101 cisco logo sign with clouds at partner summit 2016

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco's acquisition of Duo Security opens many new IAM and cloud security opportunities for Cisco, but additional work remains.

lock, chain, blocks and binary code

Blockchain only as strong as its weakest link

The blockchain might be secure, but is all the software interacting with it? In many cases, no. We’ve seen in an increase in cyberattacks due to vulnerabilities in the software side of the blockchain, from wallets to smart contracts...

danger

Hundreds of HP inkjet printer models vulnerable to critical remote code execution flaws

Hundreds of HP inkjet printer models are in desperate need of firmware patches before hackers start exploiting vulnerabilities to gain remote code execution.

phishing hacker binary keyboard privacy security breach

Introducing Kit Hunter, a phishing kit detection script | Salted Hash, Ep. 40

Kit Hunter is a basic Python script that will run on Linux or Windows. When you run Kit Hunter it searches web directories for phishing kits based on common kit elements located in the tag file. If there is a match, it logs the...

ccleaner

Avast pulls CCleaner version that lacked privacy options after backlash

Avast-owned Piriform reverted to a previous version of CCleaner in response to user outrage over its new data collection policy that had no privacy options.

primary laptop with certificate degree for technology

Top bachelors and masters cybersecurity degree programs

These are some of the best on-campus and online cybersecurity degree programs helping to meet the cybersecurity job demand.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

quantum

How quantum computers will destroy and (maybe) save cryptography

Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.

Load More