Cybersecurity News


Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines

To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.
13 July 2020

A ‘New Age’ of Sophisticated Business Email Compromise is Coming

A ‘New Age’ of Sophisticated Business Email Compromise is Coming A new BEC threat group is heralding more sophisticated email scams that target organizations without DMARC and squeeze as much money out of victims as possible.
13 July 2020

The Enemy Within: How Insider Threats Are Changing

The Enemy Within: How Insider Threats Are Changing Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk.
13 July 2020

How CARTA Strategies for Web Applications are Met with Indusface AppTrana Solution

How CARTA Strategies for Web Applications are Met with Indusface AppTrana Solution From an operational standpoint, the foundation of CARTA starts with an assessment and then building the zero-trust principles on top of that with an adaptive security model.
13 July 2020

Learn About the Latest Election Security Threats and Defenses at Black Hat USA

Christopher Krebs, director of the CISA, will explain how the organization is leading the federal effort to support state and local officials in their mission to secure US elections this year.
13 July 2020

MGySgt Scott Stalker’s 2020 Reading List

MGySgt Scott H. Stalker’s 2020 Reading List By William Knowles @c4i Senior Editor InfoSec News July 8, 2020 One of the interesting parts of the COVID-19 pandemic with the number […]
13 July 2020

Hacker breaches security firm in act of revenge

Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.
12 July 2020

Russian hacker found guilty for Dropbox, LinkedIn, and Formspring breaches

Sentencing scheduled for September 2020.
11 July 2020

Researchers create magstripe versions from EMV and contactless cards

Banking industry loophole reported more than a decade ago still remains open and ripe for exploitation today.
10 July 2020

Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack

Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack Researcher warns the highly-rated Kasa family of security cameras have bugs that gives hackers access to private video feeds and settings.
10 July 2020

Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers

RSA data reveals a continued shift away from browser-based fraud as attackers target mobile apps.
10 July 2020

Biden Campaign Hires 2 Top Cybersecurity Executives

The campaign has filled the positions of CISO and CTO in the runup to the 2020 presidential election.
10 July 2020

Google Bans Stalkerware Ads – With a Loophole

Google Bans Stalkerware Ads – With a Loophole Starting in August Google is banning ads of products or services promoting stalkerware.
10 July 2020

Amazon tells employees to remove TikTok from their phones due to security risk

Accessing the TikTok website from work laptops is still allowed, according to an internal email Amazon sent to employees today.
10 July 2020

Smartwatch Hack Could Trick Dementia Patients into Overdosing

Smartwatch Hack Could Trick Dementia Patients into Overdosing Attackers could hack the smartwatch and send dementia patients alerts for taking their medication.
10 July 2020

Zoom to Patch Zero-Day Vulnerability in Windows 7

The flaw also affects older versions of the operating system, even if they're fully patched.
10 July 2020

As Offices Reopen, Hardware from Home Threatens Security

As Offices Reopen, Hardware from Home Threatens Security Devices out of sight for the past several months could spell trouble when employees bring them back to work.
10 July 2020

4 Security Tips as the July 15 Tax-Day Extension Draws Near

We're continuing to see cybercriminals take advantage of COVID-19, and the extension of Tax Day will be the next technique used in their sophisticated method of attacks.
10 July 2020

Week in security with Tony Anscombe

Up close with the Evilnum group and its eponymous malware – A severe flaw in networking gear – Router firmware under the microscope

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

10 July 2020

Report: Most Popular Home Routers Have ‘Critical’ Flaws

Report: Most Popular Home Routers Have ‘Critical’ Flaws Common devices from Netgear, Linksys, D-Link and others contain serious security vulnerabilities that even updates don’t fix.
10 July 2020