Cybersecurity News
Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags
![Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags](https://media.threatpost.com/wp-content/uploads/sites/103/2021/05/10140727/pipeline-nature-150x150.jpg)
13 May 2021
Fake Android, iOS apps promise lucrative investments while stealing your money
Hundreds of malicious cryptocurrency, stock, and banking apps have been discovered by researchers.13 May 2021
Identity Theft
Identity theft is when someone steals information about you and then uses that information to pretend to be you and commit crimes, such as credit card fraud. One of the key steps to protecting yourself is monitoring your financial, credit score and credit card accounts. The sooner you detect fraud in any of these accounts, the sooner you can minimize the damage.13 May 2021
Despite Heightened Breach Fears, Incident Response Capabilities Lag
Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.12 May 2021
Researchers Unearth 167 Fake iOS & Android Trading Apps
The apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.12 May 2021
Putting The Spotlight on DarkSide
Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.12 May 2021
66% of CISOs Feel Unprepared for Cyberattacks
More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.12 May 2021
Researchers Flag e-Voting Security Flaws
![Researchers Flag e-Voting Security Flaws Researchers Flag e-Voting Security Flaws](https://media.threatpost.com/wp-content/uploads/sites/103/2018/08/13095546/digital-voting-challenge-featured-1-150x150.jpg)
12 May 2021
Vulnerable Protocols Leave Firms Open to Further Compromises
Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.12 May 2021
Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales
![Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales](https://media.threatpost.com/wp-content/uploads/sites/103/2021/05/12145806/VaccineCard-150x150.jpg)
12 May 2021
Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker
Understanding a few basics about how password crackers think and behave could help you keep your users safer.12 May 2021
Gig Workers Paid $500 for Payroll Passwords
![Gig Workers Paid $500 for Payroll Passwords Gig Workers Paid $500 for Payroll Passwords](https://media.threatpost.com/wp-content/uploads/sites/103/2021/02/19115146/credential-stuffing-cyberattack-150x150.jpg)
12 May 2021
‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices
![‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices ‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices](https://media.threatpost.com/wp-content/uploads/sites/103/2020/02/10101640/Emotet-WiFi-150x150.jpg)
12 May 2021
1 million risky apps rejected or removed from Apple’s App Store in 2020
Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions
The post 1 million risky apps rejected or removed from Apple’s App Store in 2020 appeared first on WeLiveSecurity
12 May 2021
Cybersecurity: What Is Truly Essential?
![Cybersecurity: What Is Truly Essential? Cybersecurity: What Is Truly Essential?](https://img.deusm.com/darkreading/602x250_moving-boxes.jpg)
12 May 2021
Why You Should Be Prepared to Pay a Ransom
Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.12 May 2021
The Long Road to Rebuilding Trust after 'Golden SAML'-Like Attacks
Eradicating 'privileged intruders' from the network in the aftermath of an attack poses major challenges, experts say.12 May 2021
TeaBot Trojan Targets Banks via Hijacked Android Handsets
![TeaBot Trojan Targets Banks via Hijacked Android Handsets TeaBot Trojan Targets Banks via Hijacked Android Handsets](https://media.threatpost.com/wp-content/uploads/sites/103/2021/05/12083949/Europe-Mobile-150x150.jpg)
12 May 2021
ESET Research goes to RSA Conference 2021 with two presentations
We will explore two threats – Android stalkerware and XP exploits
The post ESET Research goes to RSA Conference 2021 with two presentations appeared first on WeLiveSecurity
12 May 2021
ESET Research goes to RSA Conference 2021 with record number of presentations
We will explore Android stalkerware, air-gapped networks and XP exploits
The post ESET Research goes to RSA Conference 2021 with record number of presentations appeared first on WeLiveSecurity
12 May 2021