Cybersecurity News


UK police deny responsibility for poster urging parents to report kids for using Kali Linux

Updated: Using Discord, too, is apparently a warning sign that your child is turning into a naughty hacker.
14 February 2020

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say Flaws in the blockchain app some states plan to use in the 2020 election allow bad actors to alter or cancel someone’s vote or expose their private info.
14 February 2020

MOBE ’six-figure income from home’ swindlers to pay FTC $17m, hand over tropical island real estate

21 steps, thousands of dollars, and the secret to easy cash was revealed.
14 February 2020

Nedbank says 1.7 million customers impacted by breach at third-party provider

Hacker(s) believed to have exploited a vulnerability to breach Nedbank's marketing contractor.
14 February 2020

How romance scammers break your heart – and your bank account

What are some of the most common warning signs that your online crush could be a dating scammer?

The post How romance scammers break your heart – and your bank account appeared first on WeLiveSecurity

14 February 2020

Virtual Private Networks

Virtual Private Networks (VPN) create encrypted tunnels when you connect to the Internet. They are a fantastic way to protect your privacy and data, especially when traveling and connecting to untrusted or unknown networks, such as at hotels or coffee shops. Use a VPN whenever possible, both for work and personal use.
14 February 2020

Rutter's store chain discloses security breach involving POS malware

Security breach impacts locations in Pennsylvania and West Virginia.
13 February 2020

Ohio man arrested for running Bitcoin mixing service that laundered $300 million

This is the first case the DOJ has brought against a Bitcoin mixer.
13 February 2020

Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec

Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?
13 February 2020

DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019

Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.
13 February 2020

Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems

The new threat model hones in on ML security at the design state.
13 February 2020

Babel of IoT Authentication Poses Security Challenges

With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.
13 February 2020

Critical WordPress Plugin Bug Afflicts 700K Sites

Critical WordPress Plugin Bug Afflicts 700K Sites Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.
13 February 2020

FBI: Cybercrime losses tripled over the last 5 years

On the upside, the Bureau recovered more than US$300 million in funds lost to online scams last year

The post FBI: Cybercrime losses tripled over the last 5 years appeared first on WeLiveSecurity

13 February 2020

Huawei Charged with RICO Violations in Federal Court

A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.
13 February 2020

7 Tax Season Security Tips

7 Tax Season Security Tips Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
13 February 2020

Small Business Security: 5 Tips on How and Where to Start

There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.
13 February 2020

US charges Huawei with racketeering and conspiracy to steal trade secrets

US updates charges against Huawei, adds racketeering and IP theft allegations against the Chinese telco provider and its CFO.
13 February 2020

Apps Remain Favorite Mobile Attack Vector

Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.
13 February 2020

Privacy Experts Skeptical of Proposed Data Protection Agency

Privacy Experts Skeptical of Proposed Data Protection Agency A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.
13 February 2020