News

anti facebook primary
nup 177120 0001

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

Dislike! Social media addiction

Facebook's free VPN acts like spyware to iOS users in the U.S.

Facebook's new VPN service for iOS users in the U.S. claims to provide security protections, but it also tracks users -- collecting mobile data traffic.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

cloud security lock

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

group chat services - Telegram

Hackers exploit zero-day flaw in Telegram to mine cryptocurrency

Kaspersky Lab researchers discovered a zero-day flaw in Telegram Messenger's desktop client that was exploited to mine cryptocurrency or to install a backdoor.

sequence 01.00 00 31 14.still001
video

Mingis on Tech: A preview of Mobile World Congress 2018

This year's big show in Barcelona begins Feb. 26, and while hardware announcements are always part of the event, attendees are more likely to hear a lot about 5G networking.

mergers

Apple, Cisco, Aon and Allianz partner in cyber risk management

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution.

2018 Winter Olympics – Opening ceremony – PyeongChang, South Korea – February 9, 2018

Winter Olympics hit with cyber attack during opening ceremony

Officials confirm that a cyber attack caused issues during the 2018 Winter Olympics opening ceremony in PyeongChang.

ep 18 salted hash

Salted Hash Ep 18: Mobile security and privacy

Everyone, from activists, journalists, CEOs, and politicians, walk around with a computer in their pocket, sometimes calling it a phone. This week on Salted Hash, we talk about mobile privacy and security with the founder of The...

Equifax credit bureau logo and building security breach

Equifax hackers may have stolen more data than originally revealed

A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers.

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

cyberattack laptop arrows war fight

Kaspersky: Accidental DDoS attacks among top threats

Kaspersky Lab's Q4 2017 DDoS Intelligence Report found most DDoS attacks were sabotage and attempts to cash in on Bitcoin, but some were accidental attacks.

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

james comey fbi cyberconference

Internal FBI emails indicate White House lied about support for Comey's firing

Over 100 internal FBI emails written by FBI managers indicate the White House "was lying" about people in the bureau supporting Director James Comey's firing.

Salted Hash Ep 17: Spectre and Meltdown, a vehicle that no one is using

Welcome to another episode of Salted Hash. This week, Salted Hash is joined by our new Staff Writer, J.M. Porup, to talk about some recent developments related to Spectre and Meltdown, including patch fixes, future mitigations, and a...

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

steal theft hacker crime laptop firewall

3 leaked NSA exploits work on all Windows versions since Windows 2000

The EternalSynergy, EternalRomance, and EternalChampion exploits have been reworked to work on all vulnerable Windows versions: Windows 2000 -- Server 2016.

fingerprint scan biometric security system

Baltimore Police to use fingerprint scanning to combat overtime fraud

In light of the Baltimore Police Department’s Gun Trace Task Force scandal, the police will use fingerprint scans to clock in and out of work.

Load More