Cybersecurity News
Facebook Tops Imitated Brands as Attackers Target Tech
Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.06 February 2020
Facebook now lets parents monitor their children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13
The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity
06 February 2020
Facebook now lets parents monitor their children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13
The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity
06 February 2020
Metamorfo Returns with Keylogger Trick to Target Financial Firms

06 February 2020
U.S. Finance Sector Hit with Targeted Backdoor Campaign

06 February 2020
Poll: A Matter of Trust
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.06 February 2020
A Matter of Trust
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.06 February 2020
Invisible Pixel Patterns Can Communicate Data Covertly
University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.06 February 2020
How Can We Make Election Technology Secure?

06 February 2020
The RSAC 2020 Trend Report

06 February 2020
Dutch court rules AI benefits fraud detection system violates EU human rights
SyRI was used to predict who may be at high risk of conducting housing or social security fraud.06 February 2020
RSAC Sets Finalists for Innovation Sandbox

06 February 2020
RSAC Sets Finalists for Innovation Sandbox

06 February 2020
Charming Kitten Uses Fake Interview Requests to Target Public Figures

06 February 2020
Dropbox Passes $1M Milestone for Bug-Bounty Payouts

06 February 2020
Health Share of Oregon discloses data breach, theft of member PII
A break-in and stolen laptop are at the heart of the security incident.06 February 2020
Academics steal data from air-gapped systems using screen brightness variations
Israeli researchers use quick flickers in LCD screen brightness to encode and exfiltrate data.06 February 2020
Vixie: The Unintended Consequences of Internet Privacy Efforts

05 February 2020
When Your Used Car is a Little Too ‘Mobile’
Many modern vehicles let owners use the Internet or a mobile device to control the car's locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here's the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.05 February 2020