A recent health data breach in Australia allegedly involving a teenager leaking data from a paging system serves as a reminder of the risks posed by legacy equipment.
A 21-year-old Cypriot man, who is accused of hacking into websites and stealing personal data to extort his victims, has been extradited to the U.S. to face charges of wire fraud and computer hacking.
As organizations that shifted to a remote workforce consider allowing some workers to return to the office environment, CISOs must reassess their security infrastructures, says Chris Kubic of Fidelis Cybersecurity, who formerly was CISO at the National Security Agency.
Companies can use data analytics and artificial intelligence to help mitigate the risk of collusion between their employees and vendors, says Amine Antari, managing director at the consultancy Kroll.
Following Twitter's admission that cryptocurrency scammers socially engineered its employees to gain control of 45 high-profile accounts, one reaction has been: Why didn't anyone crack Twitter sooner? Unfortunately, the answer is that they have, especially if you count nation-states bribing insiders.
The U.S. Department of Justice has charged two Chinese nationals with hacking into the systems of hundreds of organizations in the U.S. and abroad. The suspects' activities allegedly included probing for vulnerabilities in systems at companies developing COVID-19 vaccines, treatments and testing tech.
The British government was underprepared for Russia's alleged attempts to influence the outcomes of the Brexit referendum in 2016 and the 2017 general election and failed to conduct adequate investigations, according to a report by the U.K. Parliament's Intelligence and Security Committee.
Which entities will be custodians of our identities? David Birch of Consult Hyperion discusses why banks could be likely candidates for this emerging role.
Cybercriminals are exploiting and using weak IoT devices in new ways, including as proxies for e-commerce fraud, says Allison Nixon of Unit 221b, who predicts that the next mass attack on the scale of Mirai will likely be way worse.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
How have the COVID-19 pandemic, lockdown and job losses affected the character and composition of the internet? Rapid7's Tod Beardsley rounds up the latest research into the prevalence of outdated and unsecured internet protocols and internet-connected devices - and there's both good and bad news.
A group of spoofed cryptocurrency trading apps is targeting devices running macOS to install malware called Gmera, security firm ESET reports. The malware can steal users' data as well as their cryptocurrency wallets.
A federal judge has ruled that Facebook's lawsuit against NSO Group - alleging that the Israeli company illegally developed a zero-day exploit to spy on WhatsApp users - can proceed.
Despite warnings from security researchers and U.S. Cyber Command earlier this month, thousands of users have not yet patched their F5 BIG-IP networking products to fix a critical vulnerability that could allow for remote code execution, according to the security firm Expanse.
It's illegal in the U.S. to circumvent technological measures on software, either for security research or to install a fix. But Kyle Wiens of iFixit says the growing "right to repair" movement is seeking to put the power back into the hands of device owners.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.