Month: January 2020
-
Advanced Obfuscation Marks Widespread Info-Stealing Campaign
A large-scale spam campaign bent on spreading info-stealing malware is applying advanced obfuscation techniques to get around security …
-
Why Amazon’s Ring and facial recognition technology are a clear and present danger to society
“The deployment of connected home security cameras that allow footage to be queried centrally are simply not compatible with a free …
-
Evil Corp Returns With New Malware Infection Tactic
Cybercrime group Evil Corp (a.k.a. TA505 or Dudear) is back in action after a short hiatus, with a technique in its arsenal not previously …
-
Lawsuit in India Seeks to Shut Down Access to U.S. Journalism Website
Computer security researchers and journalists play a critical role in uncovering flaws in software and information systems. Their research …
-
The Apache Software Foundation releases its 2019 security report
The Apache Software Foundation (ASF) is reviewing the state of security across its 300+ projects in a recently released …
-
Cyber criminals using Coronavirus emergency to spread malware
Cybersecurity firms IBM X-Force and Kaspersky have identified a new campaign in which botnet-driven, malware-infected emails are being sent …
-
Watch Out for Coronavirus Phishing Scams
As coronavirus infections spread this week, the World Health Organization classified the outbreak as a global emergency on Thursday. On …
-
Congress Must Stop the Graham-Blumenthal Anti-Security Bill
There’s a new and serious threat to both free speech and security online. Under a draft bill that Bloomberg recently leaked, the Attorney …
-
Iowa Prosecutors Drop Charges Against Men Hired to Test Their Security
On Sept. 11, 2019, two security experts at a company that had been hired by the state of Iowa to test the physical and network security of …
-
Border Patrol Detains Iranian-Born American Soldier at the Border, Seizes Their Phone
Earlier this month Customs and Border Protection seized the iPhone of an active duty American soldier as they were transferring through a …
-
‘George’ the Most Popular Password That’s a Name
The most common type of password is a name, and the most common name password is George, according to a new analysis of compromised …
-
What It’s Like to Be a CISO: Check Point Security Leader Weighs In
Check Point Software CISO Jony Fischbein has a lot on his plate. Like many CISOs, he juggles the security of multiple corporate departments …
●●●