Three strategies to prove security's value

Three strategies to prove security’s value

Security executive Ricardo González doesn’t see IT security as a cost center; instead, he describes it as “a strategic investment in the reduction of corporate…

View More Three strategies to prove security’s value
IoT Botnets and DDoS Attacks: Architecting Against Disaster

IoT Botnets and DDoS Attacks: Architecting Against Disaster

Cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on…

View More IoT Botnets and DDoS Attacks: Architecting Against Disaster
Cybercriminals shop for admin access to healthcare portals

Cybercriminals shop for admin access to healthcare portals

Administrator access to backend systems is becoming the holy grail for attackers. When people think about hackers and their targets, most assume cybercriminals are after…

View More Cybercriminals shop for admin access to healthcare portals
Security Makes Remote Working Too Difficult, Say Users

Security Makes Remote Working Too Difficult, Say Users

Organizations are failing to adequately support secure remote working practices, according to new research from digital services provider Capita. Despite the undoubted productivity benefits stemming…

View More Security Makes Remote Working Too Difficult, Say Users
The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they're typed over the network

The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they’re typed over the network

It is possible to discern someone’s SSH password as they type it into a terminal over the network by exploiting an interesting side-channel vulnerability in…

View More The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they’re typed over the network
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some…

View More Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
Newly discovered cyber-espionage malware abuses Windows BITS service

Newly discovered cyber-espionage malware abuses Windows BITS service

Security researchers have found another instance of a malware strain abusing the Windows Background Intelligent Transfer Service (BITS). The malware appears to be the work…

View More Newly discovered cyber-espionage malware abuses Windows BITS service
Cisco releases guides for incident responders handling hacked Cisco gear

Cisco releases guides for incident responders handling hacked Cisco gear

Cisco published last week four guides designed to help incident responders in investigating Cisco gear they suspect has been hacked or otherwise compromised. The guides…

View More Cisco releases guides for incident responders handling hacked Cisco gear
Capital One hacker denied release, will remain in jail

Capital One hacker denied release, will remain in jail

In a hearing held earlier today, a Seattle judge decided to keep Paige Thompson, the suspect arrested on accusations of hacking Capital One, under custody…

View More Capital One hacker denied release, will remain in jail
US Man Pleads Guilty to Running $25 Million Bitcoin Laundering Scheme

US Man Pleads Guilty to Running $25 Million Bitcoin Laundering Scheme

A Los Angeles man has pleaded guilty to running a $25 million Bitcoin (BTC) money laundering scheme and selling methamphetamine. Possible life sentence News outlet…

View More US Man Pleads Guilty to Running $25 Million Bitcoin Laundering Scheme