Do you know what’s happening on your users’ devices?Head this way to find if your strategy’s on (end) point Sponsored Post You might be happy with...
Day: August 24, 2022
PC store told it can’t claim full cyber-crime insurance after social-engineering attack
PC store told it can't claim full cyber-crime insurance after social-engineering attackTwo different kinds of fraud, says judge while throwing out lawsuit against insurer A Minnesota...
SEC says brokerage accounts hijacked for $1.3m pump-and-dump scam
SEC says brokerage accounts hijacked for $1.3m pump-and-dump scam18 people and businesses charged, one giant web of connections America's financial watchdog has accused 18 individuals and...
RubyGems now requires multi-factor auth for top package maintainers
RubyGems now requires multi-factor auth for top package maintainersSign-on you crazy diamond RubyGems.org, the Ruby programming community's software package registry, now requires maintainers of popular "gems"...
Russian military uses Chinese drones and bots in combat, over manufacturers’ protests
Russian military uses Chinese drones and bots in combat, over manufacturers' protestsTestimonials from Russian generals not welcomed by DJI or Unitree Robotics Russia's military has praised...
Mozilla finds 18 of 25 popular reproductive health apps share your data
Mozilla finds 18 of 25 popular reproductive health apps share your dataScary in post-Roe America, and Poland, and far too many other places It's official: your...
TikTok wants your trust around US midterm elections data
TikTok wants your trust around US midterm elections dataMisinformation's a concern, but Chinese media giant's own data privacy practices also have people worried TikTok has joined...
How to stop the evil lurking in the shadows
How to stop the evil lurking in the shadows Webinar Barely a day goes by without news of a ransomware attack somewhere in the media. And...
After 7 years, long-term threat DarkTortilla crypter is still evolving
After 7 years, long-term threat DarkTortilla crypter is still evolving.NET-based malware can push wide range of malicious payloads, and evades detection, Secureworks says A highly pervasive...
Software developer cracks Hyundai car security with Google search
Software developer cracks Hyundai car security with Google searchTop tip: Your RSA private key should not be copied from a public code tutorial A developer says...
Google, Apple squash exploitable browser bugs
Google, Apple squash exploitable browser bugsChrome flaw has public exploit, WebKit hole actively abused along with kernel escalation Google has issued 11 security fixes for desktop...
Janet Jackson music video declared a cybersecurity exploit
Janet Jackson music video declared a cybersecurity exploitAnother reason not to play 1989's Rhythm Nation – it may mess with some hard disk drives The music...
Deluge of of entries to Spamhaus blocklists includes ‘various household names’
Deluge of of entries to Spamhaus blocklists includes 'various household names'Nastymail tracking service blames sloppy sending practices for swelling lists of dangerous mailers Spam-tracking service Spamhaus...
CEO of Israeli Pegasus spyware firm NSO to step down
CEO of Israeli Pegasus spyware firm NSO to step downCEO Shalev Hulio is stepping down as part of NSO reorganisation that will see it focus on...
How Twitter’s whistleblower could boost Elon Musk’s legal battle
How Twitter’s whistleblower could boost Elon Musk’s legal battlePeiter Zatko, former security chief, brought allegations of widespread security threats and spam concerns against the company New...
Mudge Blows Whistle on Alleged Twitter Security Nightmare
Mudge Blows Whistle on Alleged Twitter Security NightmareLawmakers and cybersecurity insiders are reacting to a bombshell report from former Twitter security head Mudge Zatko, alleging reckless...
Black Mail review – Nollywood’s finest head for London with cybercrime thriller
Black Mail review – Nollywood’s finest head for London with cybercrime thrillerA film star faces financial and family ruin as sleazy Russian mobsters blackmail him after...
Experts question security of online vote to pick Tory leader
Experts question security of online vote to pick Tory leaderTechnology should not be used as it is unproven for such high-stakes elections, one security specialist says...
Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM Market
Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM MarketM&A activity in the identity and access management (IAM) space has continued at a steady clip...
DevSecOps Gains Traction — but Security Still Lags
DevSecOps Gains Traction — but Security Still LagsAlmost half of teams develop and deploy software using a DevSecOps approach, but security remains the top area of...