Cybersecurity News
What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.Princess Cruises Confirms Data Breach
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.ACLU Sues Over U.S. Airport Facial-Recognition Technology
Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.Week in security with Tony Anscombe
ESET research into Turla's new campaign – What is CEO fraud and how to defend against it – How Microsoft enterprise accounts get hacked
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Radio.com users affected in data breach
An unknown number of people had their personal data exposed as hackers accessed database backup files
The post Radio.com users affected in data breach appeared first on WeLiveSecurity
Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us?
Law-abiding folks like us applauded Texas for its bravery - but would we have the steel will to stand on the side of justice if it happened to us? Probably not.Tor team warns of Tor Browser bug that runs JavaScript on sites it shouldn't
Tor team says it's working on a fix, but has no timeline.4:15 p.m.: An urgent message from the CEO
What is CEO fraud, why is it so prevalent, and how can organizations recognize and defend themselves against these attacks?
The post 4:15 p.m.: An urgent message from the CEO appeared first on WeLiveSecurity
Europol takes down SIM-swap hacking rings responsible for theft of millions of euros
Arrests have been made across Europe in an effort to stamp out gangs specializing in SIM-swapping attacks.The pitfalls of being an influencer: What parents should know and do
Does your child dream of becoming a YouTube or Instagram celebrity? The influencer lifestyle is not as picture-perfect as it may seem.
The post The pitfalls of being an influencer: What parents should know and do appeared first on WeLiveSecurity
State-sponsored hackers are now using coronavirus lures to infect their targets
Chinese, North Korean, and Russian government cyberspies caught using COVID-19-themed emails to infect victims with malware.Russia-Based Turla APT Group's Infrastructure, Activity Traceable
Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.New Report Shows Breach Costs Continuing to Grow
The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.Researchers Warn of Novel PXJ Ransomware Strain
While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.How Industry Feedback is Shaping the Future of PCI DSS
The Council recently conducted its most successful Request for Comment (RFC) ever - on the initial draft of Payment Card Industry Data Security Standard (PCI DSS) v4.0. To say the participation and contributions were surprising is an understatement. Our stakeholders stepped forward with more responses than we have ever seen before.