Security & Privacy

By Kevin Wharram | Over 35,000 articles on the latest cyber security news from around the world. Donations can be made to BTC 12Uc3VEdY5TaoKnxt4MHwcj2oSDM52Gb2D

Websites are attacked 58 times a day, even when patched properly

More than half (55%) of malware infected sites were running on their latest core versions when they were attacked, according to a recent SiteLock …

Social Media

Windows, Linux Servers Beware: New Malware Encrypts Files Even After Ransom Is Paid

Credit: Who is Danny/ShutterstockRansomware skyrocketed from obscurity to infamy in no time flat. Headline-grabbing campaigns like WannaCry, Petya …

Ransomware

The Dark Web? Why Small Businesses Should Concern Themselves With the Threat.

Part of the problem starts with the fact that organizations simply don't know there is a black market for the buying and selling of stolen goods.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>In the wake of the big corporate data breaches and social media scandals being reported, …

Small Business

Bolton confirms U.S. rules on use of cyber weapons has been relaxed

The White House said Thursday it had rescinded a classified Obama-era memorandum dictating when the U.S. government can deploy cyber weaponry against …

Britain to create 2,000-strong cyber force to tackle Russia threat

The near four-fold increase in manpower will provide a means of "deterring and punishing states that wish to do us harm".<p>Britain is significantly …

Cyber-attacks

Nation State Cyber Attacks on Rise, Says Europol

<b>Global ransomware attacks are increasingly linked to nation states, with the lines between politics and crime often blurring, Europe's police agency</b> …

Cyber-attacks

Credential Stuffing Attacks Generate Billions of Login Attempts

Credential stuffing attacks are a growing problem, particularly in the financial sector, where botnets can initiate so many fraudulent login attempts …

Online Life

Word Forensic Analysis and Compound File Binary Format

Word documents in compound file binary file format contain a long list of valuable data points which can be used during Word forensic authentication

Authentication

Researching The FAX Machine Attack Surface

Introduction<p>FAX machines, although being a reminiscent of a not-so-far past, are still present in lots of office spaces and can be frequently used …

Command-line

Mass WordPress compromises redirect to tech support scams

Content Management Systems (CMSes) such as WordPress, Drupal, or Joomla are under a constant barrage of fire. Earlier this year, we detailed several …

NCIX DATABREACH

I further learned that he still possessed around 300 desktop computers from NCIX’s corporate offices and retails stores, 18 DELL Poweredge servers, …

Microsoft's Jet crash: Zero-day flaw drops after deadline passes

The Zero Day Initiative has gone public with an unpatched remote-code execution bug in Microsoft's Jet database engine, after giving Redmond 120 days …

Trend Micro

Google Translate

Where are all the ‘A’s in APT?

Posted by on <i>Sep 20, 2018</i><p><i>In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company's Global Research and</i> …

Social Issues

Britain steps up cyber offensive with new £250m unit to take on Russia and terrorists

Britain will step up its cyber crime offensive against the threat from Russia and terrorist groups with a new £250m joint taskforce between the Ministry of Defence and GCHQ, it was reported last night.<p>The unit, which will be made up of some 2,000 recruits from the military and security services …

Cybersecurity

Google defends Gmail data sharing, gives few details on violations

WASHINGTON/SAN FRANCISCO (Reuters) - Alphabet Inc’s Google gave details about its policies for third-party Gmail add-ons but stopped short of fully addressing questions from U.S. senators about developers who break its email-scanning rules.<p>How user data flows between big technology platforms such …

As the Far Right Gains in Germany, Merkel Weakens

BERLIN — For nearly two weeks Chancellor Angela Merkel tried to find a way to fire her own domestic intelligence chief, a man who had publicly contradicted her and become the darling of the far right for questioning the authenticity of a video showing angry white men chasing an immigrant.<p>But she …

Horst Seehofer

How Hackers Slipped by British Airways' Defenses

On Friday, British Airways disclosed a data breach impacting customer information from roughly 380,000 booking transactions made between August 21 …

British Airways

Equifax Gets Maximum U.K. Privacy Fine Over Cyberattack Lapses

Credit reporting company Equifax Inc. was slapped with a maximum 500,000 pound ($658,000) fine by the U.K.’s privacy watchdog for failing to protect …

Personal Information

Europol cyber crime report highlights emerging threats to enterprise security

Ransomware attacks are becoming more targeted and less opportunistic, Europol has found, while warning enterprises of the threat posed by new and …

Cybercrime

Equifax fined by ICO over data breach that hit Britons

<b>Credit rating agency Equifax is to be fined £500,000 by the Information Commissioner's Office (ICO) after it failed to protect the personal data of 15 million Britons.</b><p>A 2017 cyber-attack exposed information belonging to 146 million people around the world, mostly in the US.<p>The compromised systems …

Cyber-attacks

Students blamed for university and college cyber-attacks

<b>A security analysis of cyber-attacks against universities and colleges in the UK has discovered staff or students could often be responsible, rather than organised crime or hacking groups.</b><p>A government-funded agency that provides cyber-security has examined the timing of 850 attacks in 2017-18.<p>Jisc …

Cyber-attacks

Insurance industry predicts rise in cyber-related losses over next year

That is according to a new <b>report</b> from Willis Towers Watson (WLTW), which reveals that 60% of insurers believe cyber events like the global WannaCry …

Insurance Industry

How to Spot VPNFilter Malware Before It Destroys Your Router

Router, network device, and Internet of Things malware is increasingly common. Most focus on infecting vulnerable devices and adding them to powerful …

Hackers have planted credit card stealing malware on local government payment sites

Security firm FireEye has confirmed that a widely used web payment portal used to pay for local government services, like utilities and permits, has been targeted by hackers.<p>Hackers have broken into self-hosted Click2Gov servers operated by local governments across the US, likely using a …

City Politics

Forgotten MS Office Features Used to Deliver Malware

According to Microsoft’s 2016 Threat Intelligence Report, 98% of Office-targeted threats use macros. So, shouldn’t we just focus our efforts on …

New trends in the world of IoT threats

Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in …

Routers

Magecart Strikes Again: Newegg in the Crosshairs

September 19, 2018<p><i>Volexity has conducted the following research in collaboration with RiskIQ. We will discuss the same incident from different</i> …

British Airways