Cybersecurity News


5 Human Factors That Affect Secure Software Development

With the move to remote work, it's especially important to understand how to support, discourage, and monitor conditions for development teams.
27 October 2020

Code42 Incydr Series: Secure Data in the Age of Remote Work

Code42 Incydr Series: Secure Data in the Age of Remote Work With Code42 Incydr, you can keep tabs on when and where your data is going — without restricting where or how your employees want to collaborate and work.
27 October 2020

Holiday Shopping Craze, COVID-19 Spur Retail Security Storm

Holiday Shopping Craze, COVID-19 Spur Retail Security Storm Veracode's Chris Eng discusses the cyber threats facing shoppers who are going online due to the pandemic and the imminent holiday season.
27 October 2020

Google Boots 21 Bogus Gaming Apps from Play Marketplace

Google Boots 21 Bogus Gaming Apps from Play Marketplace Android apps packed with malware from HiddenAds family downloaded 8 million times from the online marketplace.
27 October 2020

Google Mending Another Crack in Widevine

For the second time in as many years, Google is working to fix a weakness in its Widevine digital rights management (DRM) technology used by online streaming sites like Disney, Hulu and Netflix to prevent their content from being pirated.
26 October 2020

Hacker steals $24 million from cryptocurrency service 'Harvest Finance'

Hacker returned $2.5 million while Harvest Finance authors put out a $100,000 reward for anyone who can return the rest of the funds.
26 October 2020

Microsoft IE Browser Death March Hastens

Microsoft IE Browser Death March Hastens Internet Explorer redirects more traffic to Edge Chromium browser as Microsoft warns of the upcoming demise of the once dominant browser.
26 October 2020

Neural Networks Help Users Pick More-Secure Passwords

Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.
26 October 2020

Cybercriminals Extort Psychotherapy Patients Following Vastaamo Breach

An attacker is running a Tor site to leak the session notes of 300 patients at Vastaamo, a Finnish psychotherapy facility.
26 October 2020

‘Among Us’ Mobile Game Under Siege by Attackers

‘Among Us’ Mobile Game Under Siege by Attackers Ongoing attacks on the wildly popular game Among Us are testing developers’ ability to keep up.
26 October 2020

Adware found in 21 Android apps with more than 7 million downloads

Six of the 21 apps are still available on the Google Play Store.
26 October 2020

New Report Links Cybersecurity and Sustainability

Some have also created the role of chief sustainability officer, according to Kaspersky.
26 October 2020

Containerd Bug Exposes Cloud Account Credentials

Containerd Bug Exposes Cloud Account Credentials The flaw (CVE-2020-15157) is located in the container image-pulling process.
26 October 2020

Teach Your Employees Well: How to Spot Smishing & Vishing Scams

Teach Your Employees Well: How to Spot Smishing & Vishing Scams One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.
26 October 2020

Over 100 irrigation systems left exposed online without a password

More than half of the exposed systems are located inside Israel.
26 October 2020

Vastaamo Breach: Hackers Blackmailing Psychotherapy Patients

Vastaamo Breach: Hackers Blackmailing Psychotherapy Patients Cybercriminals have already reportedly posted the details of 300 Vastaamo patients - and are threatening to release the data of others unless a ransom is paid.
26 October 2020

‘Among Us’ players hit by major spam attack

In-game chats were flooded with messages from somebody who tried to coerce players into subscribing to a dubious YouTube channel

The post ‘Among Us’ players hit by major spam attack appeared first on WeLiveSecurity

26 October 2020

Nando’s Hackers Feast on Customer Accounts

Nando’s Hackers Feast on Customer Accounts Multiple chicken diners said their usernames and passwords were stolen and the accounts used to place high-volume orders.
26 October 2020

Microsoft's Kubernetes Threat Matrix: Here's What's Missing

Microsoft's Kubernetes Threat Matrix: Here's What's Missing With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.
26 October 2020

The Story of McAfee: How the Security Giant Arrived at a Second IPO

Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.
26 October 2020