- Welcome Guest
- Sign In
An alarming number of major U.S. retailers, industrial firms, government agencies and other organizations have been hit in a recent wave of cyberbreaches that may signal increasing vulnerability for consumers and businesses alike. Cyberthieves have used a variety of methods to infiltrate corporate c...
Atlanta has made progress toward recovery, but it is still far from business as usual. Hackers encrypted many of the city government's vital data and computer systems.
The DoJ has charged nine Iranian nationals for engaging in a massive phishing campaign on behalf of the Iranian Revolutionary Guard. The allegations include the theft of $3.4 billion in research and intellectual property from 320 colleges and universities in the U.S. and abroad, as well as from 47 f...
The tech world experienced more insanity last week. We finally got confirmation from AMD that the CTS Labs security report was a tempest in a teapot, but the big question remained unanswered. A self-driving Uber vehicle killed a pedestrian, but we didn't ask the right questions. Facebook admitted th...
A virtual currency hardware wallet with millions of users has been compromised. Saleem Rashid explained how he cracked the firmware on the wallet produced by Ledger using what's known as a "supply chain" attack. That means a targeted device is compromised before any users get their hands on it. The ...
Americans have been targeted on social media by Russian agents on a mission to harvest personal information. The agents pretended to work for organizations promoting African-American businesses as a ruse to obtain personal information from black business owners during the 2016 presidential election ...
Sony Semiconductor Solutions, Nikon, Foxconn, Scenera and Wistron have formed an alliance to create standards that allow surveillance and IP cameras to play well with each other. The NICE Alliance, unveiled Monday, aims to create a new smart camera ecosystem, along the lines of the mobile ecosystems...
It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attem...
As beneficial as artificial intelligence can be, it has its dark side, too. That dark side is the focus of a 100-page report a group of technology, academic and public interest organizations jointly released. AI will be used by threat actors to expand the scale and efficiency of their attacks, the r...
Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. "Very often small businesses don't feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attack...
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Pr...
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is a dated version of the company's mobile operating system, it's possible that the leaked code could be used to jailbreak older devices or worse. Publicati...
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balanc...
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a report released Tuesday. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hacker...