Linux, malware and data breaches – what can we learn? [VIDEO] – Naked Security

Have you ever thought about how you’d deal with the aftermath of a data breach? Would you be able to give your customers the bad news quickly, usefully and honestly? We...

Indian iPhone Spy Campaign Used Fake MDM Platform

Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has...

Mueller Probe Yields Hacking Indictments for 12 …

GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation.Twelve Russian military officers have been indicted on hacking charges as part of Special Counsel Robert...

Facebook ordered to let grieving mother in to dead daughter’s account – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Justice Department Indicts 12 Russian Nationals Tied to 2016 Election Hacking

Indictments are part of special counsel Robert Mueller's investigation of Russian interference in the 2016 elections. Source link

8 Big Processor Vulnerabilities in 2018

Enterprise VulnerabilitiesFrom...

Sextortion scam knows your password, but don’t fall for it – Naked Security

Someone has been sending sextortion scam emails with a new twist – one aimed at making it more likely you’ll be duped into paying a blackmail fee. One of the emails arrived...

Gas Pump Hack – Schneier on Security

Gas Pump Hack This is weird: Police in Detroit are looking for two suspects who allegedly managed to hack a gas pump and steal...

SOCs Use Automation to Compensate for Training, …

Executives and front-line SOC teams see human and technology issues in much different ways, according to two new reports.A Security Operations Ccnter is an expensive resource for protecting enterprise computing...

Default router password leads to spilled military secrets – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

APLICATIONS

HOT NEWS