Digital Security

By Wesley Fryer | Wesley Fryer created a magazine on Flipboard. “Digital Security on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Wesley Fryer”.

Medical Devices Hit By Ransomware For The First Time In US Hospitals

Is it possible that North Korea used a stolen National Security Agency hacking tool to infect medical devices at U.S. hospitals? Turns out, in today’s topsy-turvy world, it is.<p>When the NSA cyber weapon-powered WannaCry ransomware spread across the world this past weekend, it infected as many as …

United States

What to Do If You're Infected by Ransomware

Ransomware infection can be pretty scary, but don't panic. If you see a note appear on your computer screen telling you that the computer is locked, …

Anti-Virus Software

Windows 10 Tips and Tricks

Ready to learn a variety of tips, tricks, and ideas to get more from your Windows 10 computer? In this blog entry, we will explore a few exciting …

Microsoft

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.One security researcher has already managed to replicate it, even as Google is trying to protect users from such attacks.“It looks exactly like the original spoof,” said Matt Austin, director …

Google Docs

Here are some of the biggest organizations hit by the recent global cyberattack

A huge range of organizations around the world have been affected by the WannaCry ransomware cyberattack, described by the EU's law enforcement agency as "unprecedented."<p>Here are some of the most prominent victims, from Britain's National Health Service (NHS) to French carmaker Renault and the …

Cybersecurity

010 - Critical

The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are …

Information Security

FBI Gives Hollywood Hacking Victims Surprising Advice: "Pay the Ransom"

Netflix isn't alone: Agencies and others are balancing demands for money against the fears of stolen data ending up online.<p>Phones are the lifeblood …

Security

Update your Windows systems now. Right now.

Are you one of those people who ignores prompts to update your Windows system? Well, Friday's massive international cyberattack may give you the best reason of all to hit “update” when prompted.<p>Microsoft on Friday said in a statement that it has "added detection and protection" to shield Windows …

Microsoft

WannaCrypt ransomware: Microsoft issues emergency patch for Windows XP

Microsoft takes unusual step of providing direct support to unsupported systems as targets in 74 countries - including vast swathes of UK hospitals - …

Microsoft

An NSA Cyber Weapon Might Be Behind A Massive Global Ransomware Outbreak

It’s been a matter of weeks since a shady hacker crew called Shadow Brokers dumped a load of tools believed to belong to the National Security Agency (NSA). It now appears one leaked NSA tool, an exploit of Microsoft Windows called EternalBlue, is being used as one method for rapidly spreading a …

Information Security

Industrial robots are more vulnerable to cyberattacks than you think

A new report from Trend Micro indicates that industrial robots are targets for hackers and cybercriminals. Find out the researchers' proposed …

Cybersecurity

New password guidelines say everything we thought about passwords is wrong

When I recently discovered a draft of new guidelines for password management from NIST (the National Institute of Standards and Technology), I was amazed about the number of very progressive changes they proposed.<p>Although NIST’s rules are not mandatory for nongovernmental organizations, they …

Security

The State of Security in the Connected Home

For some, it was an introduction; for others it was a harsh reminder.<p>October 21, 2016 marked a memorable day in history as an Internet of Things …

Internet of Things

Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons

Microsoft said up-to-date Windows machines aren’t vulnerable to leaked tools said to have belonged to the National Security Agency, but as many as 150,000 who haven’t installed updates are now infected with the so-called DOUBLEPULSAR tool. (AP Photo/Raphael Satter)<p>It’s been little over a week and a …

Security

Will your business be next? Customisable ransomware makes it easy for criminals to target organisations

An easy-to-use form of ransomware is enabling even low-level cybercriminals to tailor attacks against organisations or even individuals with …

Ransomware

Most Millennials Regularly Stream Pirated Content, Survey Finds

Despite the widespread availability of legal streaming services, piracy remains rampant among millennials in North America.<p>This is one of the main …

Millennials

Smashing Security podcast #018: Windows is a virus. True or False?

Three security industry veterans, chatting about computer security and online privacy.<p>| April 27, 20179:14 am | Filed under: Data loss, Malware, …

Hacking the Cybersecurity Demand Curve

The daily drumbeat of cyber crime appears to have no boundaries. Recent testimony to the Senate Finance Committee revealed that hackers compromised …

Cybersecurity

UPDATED (3/22/17): IRS Official to Schools: “One of the Most Dangerous Email Phishing Scams We’ve Seen”

<b>“This is one of the most dangerous email phishing scams we’ve seen in a long time. It can result in the large-scale theft of sensitive data that</b> …

Identity Theft

Over 36,000 Computers Infected with NSA's DoublePulsar Malware

DOUBLEPULSAR, one of the NSA hacking tools leaked last Friday by the Shadow Brokers, has been used in the wild by ordinary hackers, who infected over …

Information Security

Devilishly Clever Phishing Scam Could Fool Even the Most Cautious Into Revealing Their Passwords

Many popular browsers are vulnerable. Is yours one of them?<p>You've probably gotten this advice many times: Before you click on a link, or certainly before you enter your username and password on a website, carefully check the URL that pops up in your browser's address bar to make sure it looks …

Security

Unicode trick lets hackers hide phishing URLs

Some perfectly authentic looking web addresses are not what they seem and not all browsers are taking the problem seriously<p>Here’s a challenge for you: you click on a link in your email, and find yourself at the website https://аррӏе.com. Your browser shows the green padlock icon, confirming it’s a …

Information Security

Karmen Ransomware Variant Introduced by Russian Hacker

The Recorded Future Blog<p>Karmen Ransomware Variant Introduced by Russian Hacker<p>Posted in<p>by Diana Granger on April 18, 2017<p>On March 4, 2017, a member …

Ransomware

How to Set Up Your Own Completely Free VPN In the Cloud

A Virtual Private Network (VPN) is a great way to add security to your browsing while also preventing snoopers (including your internet service …

Linux

She went to Ancestry.com for a family tree. Instead, she found a stolen identity.

Forty-four years ago, Nathan Laskoski died and was buried in a Texas cemetery before he had even reached the age of 3 months.<p>But late last year, Nathan’s aunt was perusing Ancestry.com to track down information for the family tree when she clicked on a link that startled her.<p>Nathan Laskoski wasn’t …

Crime

Burger King just hijacked your Google Home speaker

Brace yourselves, everyone. Advertisers figured out how to manipulate your voice-activated assistants.<p>Burger King just showed us in 15 seconds how voice-activated speakers can be used for ill. In a new ad, an actor dressed like a Burger King employee holds up a Whopper and explains that he can’t …

Burger King

Fraudsters need just three details to steal your identity – and most of it can be found on Facebook

Fraudsters need just three key bits of information to steal your identity and access your accounts, take out loans, credit cards, mobile phones in your name.<p>All it takes is a name, date of birth and address – and most of this can be found on social media profiles, such as Facebook. And if your …

Identity Theft

Ransomware: Why one version of this file-encrypting nightmare now dominates

​Move over Locky; there's a new king of ransomware...<p>Ransomware boomed last year, with the malicious file-encrypting software rising to become …

Microsoft Word 0-day used to push dangerous Dridex malware on millions

Blast could give a boost to Dridex, one of the Internet's worst bank fraud threats.<p>Booby-trapped documents exploiting a critical zero-day …