Cybersecurity News


Researchers Flag e-Voting Security Flaws

Researchers Flag e-Voting Security Flaws Paper ballots and source-code transparency are recommended to improve election security.
12 May 2021

Vulnerable Protocols Leave Firms Open to Further Compromises

Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
12 May 2021

Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales

Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales A new type of fraud is spiking across the platform: Selling fake vax records to people who want to lie their way into places where proof of vaccine is required.
12 May 2021

Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker

Understanding a few basics about how password crackers think and behave could help you keep your users safer.
12 May 2021

Gig Workers Paid $500 for Payroll Passwords

Gig Workers Paid $500 for Payroll Passwords Argyle is paying workers to help hack payroll providers, researchers suspect.
12 May 2021

‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices

‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're in range.
12 May 2021

1 million risky apps rejected or removed from Apple’s App Store in 2020

Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions

The post 1 million risky apps rejected or removed from Apple’s App Store in 2020 appeared first on WeLiveSecurity

12 May 2021

Cybersecurity: What Is Truly Essential?

Cybersecurity: What Is Truly Essential? In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
12 May 2021

Why You Should Be Prepared to Pay a Ransom

Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
12 May 2021

The Long Road to Rebuilding Trust after 'Golden SAML'-Like Attacks

Eradicating 'privileged intruders' from the network in the aftermath of an attack poses major challenges, experts say.
12 May 2021

TeaBot Trojan Targets Banks via Hijacked Android Handsets

TeaBot Trojan Targets Banks via Hijacked Android Handsets Malware first observed in Italy can steal victims’ credentials and SMS messages as well as livestream device screens on demand.
12 May 2021

ESET Research goes to RSA Conference 2021 with two presentations

We will explore two threats – Android stalkerware and XP exploits

The post ESET Research goes to RSA Conference 2021 with two presentations appeared first on WeLiveSecurity

12 May 2021

ESET Research goes to RSA Conference 2021 with record number of presentations

We will explore Android stalkerware, air-gapped networks and XP exploits

The post ESET Research goes to RSA Conference 2021 with record number of presentations appeared first on WeLiveSecurity

12 May 2021

Researchers track down five affiliates of DarkSide ransomware service

Customers of the RaaS can deploy malware as they see fit and dictate the content of leaks.
12 May 2021

FBI, CISA publish alert on DarkSide ransomware

The advisory deals with ransomware-as-a-service, thrust into the spotlight by the Colonial Pipeline cyberattack.
12 May 2021

You Are a Target

You may not realize it, but you are a target. Your computer, work, personal accounts, and your information are all highly valuable to cyber criminals. Be mindful that bad guys are out to get you.
12 May 2021

A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm

A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
11 May 2021

Adobe Issues Patch for Acrobat Zero-Day

The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
11 May 2021

Application Attacks Spike as Criminals Target Remote Workers

Application-specific and Web application attacks made up 67% of all attacks in 2020 as criminal strategies shifted in the pandemic.
11 May 2021

Microsoft Patch Tuesday: 4 Critical CVEs, 3 Publicly Known, 1 Wormable

Microsoft releases security patches for 55 vulnerabilities in its monthly roundup, which includes a critical, wormable flaw in the HTTP protocol stack.
11 May 2021