LabCorp Investigates a Potential Breach that Could Affect Millions

The nation's largest blood test processor detected “suspicious activity” on its network this past weekend. Source link

Defeating the iPhone Restricted Mode

Defeating the iPhone Restricted Mode Recently, Apple introduced restricted mode to protect iPhones from attacks by companies like Cellebrite and Greyshift, which allow...

Microsoft Moves Up As Phishers’ Favorite Target for …

Researchers compiled a list of the most common brands to impersonate by detecting and analyzing new phishing URLs. Microsoft is cybercriminals' favorite brand to impersonate in phishing attacks, following a...

“Astoundingly stupid” Kodak (not really) Bitcoin miner bites the dust – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Recent Andariel Group ActiveX Attacks Point to Future Targets

Changes in the group's script may indicate that the hackers may start using attack vectors other than ActiveX. Source link

Lessons Learned from Intrusion …

The advancement of AI-driven public cloud technology is changing the game of "protection by default" in the enterprise. I recently had the opportunity to brief an industry analyst on the...

Guy jailed for refusing to unlock phones – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Peer-to-Peer Crypto-Exchanges: A Haven for Money Laundering

Buyers and sellers can exchange cash in person, transfer bank funds online or can exchange funds for prepaid cards, gift cards or other cryptocurrencies. Source link

White House Cybersecurity Strategy at a Crossroads

Trump administration's initial lack of a unified front in the wake of Russian election-hacking indictments worries cybersecurity experts.Fallout from a rapid-fire series of developments surrounding the 2016 election hacking and...

Welcome to the wonderful world of GDPR! Where next? [PODCAST] – Naked Security

Here’s yesterday’s Security SOS Week podcast, right here #ICYMI. In this episode: GDPR enforcement started in May 2018. But security is a journey, not a destination, so…where next? Join Naked Security’s Paul...

APLICATIONS

HOT NEWS