March 15, 2017
Via: Naked Security“Even with the best will in the world, you cannot be completely anonymous online,” said Liz Kintzele, VP of sales and marketing at Golden Frog, at this year’s SXSW conference in Austin, Texas. Kintzele took her audience on a broad journey […]
February 23, 2017
Via: Zone AlarmAmazon has been hit with a new scam that you need to know about before making any more purchases from them. Certain products, specifically electronics, are advertised as ‘used – like new’ and appear as legitimate deals at great prices, […]
January 13, 2017
Via: MalwarebytesAnother day, another couple of rogue sponsored tweets, which lead to phishing. The account pushing the first phish has now been deleted, but it’s trivial to set up another one – and the phishing URL itself is still active, ready […]
January 5, 2017
Via: Security AffairsThe notorious black hat hacker CyberZeist (@cyberzeist2) has broken into the FBI website FBI.gov and leaked data on Pastebin. The hacker leaked the FBI.GOV accounts that he found in several backup files (acc_102016.bck, acc_112016.bck, old_acc16.bck, etc). Leaked records contain accounts […]
January 4, 2017
Via: InfoWorldOnly a handful of industry associations accomplish what they set out to do. In the security realm, I’ve always been a huge fan of the Trusted Computing Group. It’s one of the few vendor organizations that truly makes computers more […]
December 22, 2016
Via: Panda SecurityThe gift giving season is just around the corner. With the frenzy of Black Friday and Cyber Monday already behind us, shops that conduct their sales online (and their clients) should be prepared for the most hectic weeks of the […]
November 24, 2016
Via: Naked SecurityCyber Monday happens immediately after the Thanksgiving weekend, and it’s a day of potential online bargains when many people will be flocking to their browsers to look for great deals, just as they flocked to the shopping mall for in-store […]
November 24, 2016
Via: Help Net SecuritySecurity remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, despite the changing attitudes towards security, some consumers are still making basic security faux […]
November 16, 2016
Via: Dark ReadingThe Trustworthy Accountability Group (TAG) has launched the TAG “Certified Against Malware” Program as part of its broader effort to eliminate fraudulent traffic, combat Internet piracy, fight malware, and encourage transparency in the digital advertising supply chain. This initiative, which […]
November 1, 2016
Via: DataBreach TodayThe online advertising industry is at an inflection point, and not just from falling ad rates, ad blockers and potential regulation. It’s facing a big security problem, and one that – like many internet-scale problems – will demand close industry […]
October 19, 2016
Via: The HillThe group that apparently stole NSA-built cyber weapons have changed their business model from an auction to crowd-funding. The hacker or hackers known as the Shadow Brokers are now offering to publicly release the source code once used in an […]
October 17, 2016
Via: Computer WeeklyRetail websites are full of security vulnerabilities and urgent improvement is needed in the sector, according to researchers. On average, retail sites exhibit 13 “serious” security vulnerabilities that are classed as either “critical” or “high-risk” by the Open Web Application […]
September 21, 2016
Via: The HillThe Society for Worldwide Interbank Financial Telecommunication (SWIFT), the banking transactions messaging service that hackers used to steal more than $80 million from the central bank of Bangladesh, is adding a new fraud protection system. Starting in December, the network […]
August 18, 2016
Via: Security AffairsSecurity experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers can go in the wrong hands. The […]
August 2, 2016
Via: Security WeekBarclays Bank announced on Monday that it will commence rolling out voice security authentication to all customers, replacing the existing password-based method. A Barclays spokesperson told SecurityWeek this will make its “telephone banking service easier to use and more secure […]
July 18, 2016
Via: Security AffairsThe Ubuntu online forums have been hacked for the second time in a few months and data of more than 2 Million users have been exposed. According to Ubuntu, the hackers exposed users’ data including usernames, email addresses, and IP […]
July 5, 2016
Via: MalwarebytesWe have not seen very many large scale malvertising attacks following the mysterious disappearance of the powerful Angler EK. The ones we do see tend to be related to low quality traffic and usually push the less sophisticated RIG or Magnitude […]
Cyber warfare, Network security
June 29, 2016
Via: The HillThe Internal Revenue Service (IRS) is implementing new cyber-security initiatives for 2017 to stay ahead of hackers. The agency is expanding a pilot program to add 16-digit verification codes to W-2 forms, which are used to report wage and tax […]
Application security, Vulnerabilities
June 28, 2016
Via: TrendMicro BlogTom’s Hardware contributor Lucian Armasu reported in early June that security researchers had pinpointed a vulnerability in both the web browser and mobile app version of Messenger that would provide certain malicious capabilities to hackers. Further research uncovered that the processes […]
June 28, 2016
Via: CSO OnlineAfter repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically. The Electronic Filing (E-file) PINs Web application is no longer available on the […]