News

vulnerable cryptojacking hacking breach security
intro data breach circuit board technology security

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

Disastrous cyber attack on email provider wipes US servers and backups

A cyber attack on email provider VFEmail caused “catastrophic destruction,” with hackers wiping the servers and backups.

xiaomi m365 scooter

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate.

Android robot and gears emerging from isometric mobile phone screen

Android phones can be hacked remotely by viewing malicious PNG image

Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found.

Cloud Security

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns.

tt19 001 thumbnail
video

IoT and retail tech pushes envelope in 2019: TECH(talk)

What's ahead for Internet of Things technology in 2019? Prepare for more location-based advertising, warehouse robotics, and concepts such as the no-line, no-checkout Amazon Go store.

fight shadow

Vendor allegedly assaults security researcher who disclosed massive vulnerability

A security researcher alleges the COO of Atrient assaulted and threatened him after disclosing a massive vulnerability in an Atrient product.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

10 threat landscape apocalypse ruins

Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists

The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.

Nest Secure

Nest Secure had a secret microphone, can now be a Google Assistant

The Nest Secure system had secret microphone that can now make the Nest Guard security hub double as Google Assistant device.

data security

451 Research: Security is top data management challenge

A survey of highly qualified data management professionals by 451 Research shows that growing data volumes have made security their biggest concern.

Security flaws in baby cam monitors

Hijacked Nest devices highlight the insecurity of the IoT

Internet of Things (IoT) devices, such as Nest cameras and thermostats, continue to be hacked. To prevent that, follow smart password practices and turn on 2FA.

secure encrypted internet web browser alert

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.

Facebook / privacy / security / breach / wide-eyed fear

Facebook secretly paid users $20 a month to use VPN spying app

After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.

mojave group facetime

Apple disables Group FaceTime after eavesdropping bug discovered

A bug in Apple's Group FaceTime made eavesdropping easy. A patch is expected this week.

ransomware breach hackers dark web

Law enforcement shuts down xDedic marketplace for hacked servers

Cooperation among multiple agencies in the U.S. and Europe close a marketplace that sold access to servers hacked through RDP attacks.

data privacy ts

Privacy groups blast Google, IAB over data leak via ad auctions

New evidence to an ongoing GDPR complaint shows how ad categories used by Google and the Internet Advertising Bureau (IAB) profile you and apply potentially sensitive labels to you.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More