- Welcome Guest
- Sign In
The director of cybersecurity at the National Security Agency induced a few smirks among cyber pros last week when he said there wouldn’t be any backdoors in the new encryption standards his agency is working on with the National Institute of Standards and Technology.
The social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. This is the first time that hackers leveraged LinkedIn more often than any tech giant brand name like Apple, Google, and Microsoft.
Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments. Apparently, it isn’t. At least for some Linux users who ignore installing patches, critical or otherwise.
Research by a cybersecurity services provider reveals how widespread the risks are to executives and the organizations they ramrod from data brokers collecting sensitive data about them. "We see corporate executives targeted all the time in their personal lives," BlackCloak Founder and CEO Chris Pie...
Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.
Security-minded internet users looking for another layer of obscurity when traveling in cyberspace can have it with some new tech from Atlas VPN. The paid VPN service has introduced a new way to route internet traffic that's more secure and private than conventional methods. It does that by allowing...
IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.
The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.
This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...
Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.
Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...
Hours before Russia began its Ukraine invasion on Feb. 24, Microsoft found a new malware package, which it dubbed "FoxBlade." As more concerns about malware fallout from the war spread, several cybersecurity firms announced protective measures for potential victims.
Government agencies have discovered a deadlier new home and office network device killer malware that replaces weaker VPNFilter code. U.S. and U.K. governments published a joint report Wednesday detailing a new malware strain developed by Russia's military cyber unit deployed in the wild since 2019....
Russian state-sponsored cybercriminals lurked for the last two years in numerous U.S Cleared Defense Contractors' networks stealing sensitive, unclassified information along with proprietary and export-controlled technology. The Federal Bureau of Investigation, Cybersecurity and Infrastructure Secur...