Cybersecurity News


Facebook Tops Imitated Brands as Attackers Target Tech

Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.
06 February 2020

Facebook now lets parents monitor their children’s chats

The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13

The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity

06 February 2020

Facebook now lets parents monitor their children’s chats

The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13

The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity

06 February 2020

Metamorfo Returns with Keylogger Trick to Target Financial Firms

Metamorfo Returns with Keylogger Trick to Target Financial Firms The malware uses a tactic to force victims to retype passwords into their systems - which it tracks via a keylogger.
06 February 2020

U.S. Finance Sector Hit with Targeted Backdoor Campaign

U.S. Finance Sector Hit with Targeted Backdoor Campaign The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.
06 February 2020

Poll: A Matter of Trust

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.
06 February 2020

A Matter of Trust

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.
06 February 2020

Invisible Pixel Patterns Can Communicate Data Covertly

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.
06 February 2020

Wacom drawing tablets track every app you open

But there's a way to disable it.
06 February 2020

How Can We Make Election Technology Secure?

How Can We Make Election Technology Secure? In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.
06 February 2020

The RSAC 2020 Trend Report

The RSAC 2020 Trend Report What’s trending in cybersecurity? This year’s session submissions tell us.
06 February 2020

Dutch court rules AI benefits fraud detection system violates EU human rights

SyRI was used to predict who may be at high risk of conducting housing or social security fraud.
06 February 2020

RSAC Sets Finalists for Innovation Sandbox

RSAC Sets Finalists for Innovation Sandbox The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
06 February 2020

RSAC Sets Finalists for Innovation Sandbox

RSAC Sets Finalists for Innovation Sandbox The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
06 February 2020

Charming Kitten Uses Fake Interview Requests to Target Public Figures

Charming Kitten Uses Fake Interview Requests to Target Public Figures APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.
06 February 2020

Dropbox Passes $1M Milestone for Bug-Bounty Payouts

Dropbox Passes $1M Milestone for Bug-Bounty Payouts The file-sharing service also disclosed details of past notable bugs for the first time.
06 February 2020

Health Share of Oregon discloses data breach, theft of member PII

A break-in and stolen laptop are at the heart of the security incident.
06 February 2020

Academics steal data from air-gapped systems using screen brightness variations

Israeli researchers use quick flickers in LCD screen brightness to encode and exfiltrate data.
06 February 2020

Vixie: The Unintended Consequences of Internet Privacy Efforts

Vixie: The Unintended Consequences of Internet Privacy Efforts Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.
05 February 2020

When Your Used Car is a Little Too ‘Mobile’

Many modern vehicles let owners use the Internet or a mobile device to control the car's locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here's the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.
05 February 2020