Germany's cyber-security agency recommends Firefox as most secure browser

Germany’s cyber-security agency recommends Firefox as most secure browser

Firefox is the only browser that received top marks in a recent audit carried out by Germany’s cyber-security agency — the German Federal Office for…

View More Germany’s cyber-security agency recommends Firefox as most secure browser
IRS Followed Bitcoin Transactions, Resulting In Takedown Of The Largest Child Exploitation Site On The Web

IRS Followed Bitcoin Transactions, Resulting In Takedown Of The Largest Child Exploitation Site On The Web

The largest dark web child pornography site in the world has been taken down. That was the word today from the U.S. Attorney’s Office for…

View More IRS Followed Bitcoin Transactions, Resulting In Takedown Of The Largest Child Exploitation Site On The Web
China supported C919 airliner development through cyber espionage

China supported C919 airliner development through cyber espionage

Security researchers have correlated the activity of a Chinese hacker group known for targeting aerospace companies to a multi-year espionage effort by China’s intelligence agencies…

View More China supported C919 airliner development through cyber espionage
Feds Arrest International ATM Skimmer Ring

Feds Arrest International ATM Skimmer Ring

US law enforcement has arrested 18 alleged members of an international ATM criminal ring thought to be responsible for the theft of at least $20…

View More Feds Arrest International ATM Skimmer Ring
Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva, the security vendor, said this week that a misconfiguration of an Amazon Web Services (AWS) cloud instance allowed hackers to exfiltrate information on customers…

View More Imperva: Data Breach Caused by Cloud Misconfiguration
Docker Vulnerability Opens Servers to Container Code

Docker Vulnerability Opens Servers to Container Code

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE. A recently discovered…

View More Docker Vulnerability Opens Servers to Container Code
University to Create New Cybersecurity Approach Inspired by the Human Body

University to Create New Cybersecurity Approach Inspired by the Human Body

Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is…

View More University to Create New Cybersecurity Approach Inspired by the Human Body
Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Hackers backed by the Iranian government recently tried to hack email accounts used by the campaign of a US presidential candidate, a Microsoft official said…

View More Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

With cybercriminals are taking less and less time to break into corporate systems, Asia-Pacific enterprises will have look to artificial intelligence (AI) and machine learning…

View More APAC firms will need AI as speed increasingly critical in cyberdefence
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Nation-state spy agencies are only as good as their operational security—the care they take to keep their digital spy operations from being discovered. But occasionally…

View More Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC