techUK has released new guidance which reveals the top ten web vulnerabilities and provides advice on how users can protect themselves from the most common threats
The National Security Agency apparently knows with absolute certainty that North Korea was behind the recent Sony Pictures hacking, it has now emerged.
Why You Must Hacker-Proof Your Employees: Creating a Secure Corporate Culture If you’re a CTO or a network admin, you’ve probably memorized some of the basics of network security. Have lots of well-configured firewalls and IDS/IPS devices. Use switches instead of hubs. Make sure everyone uses complex passwords and make…
Ad-borne Cryptowall ransomware is set to claim FRESH VICTIMS Security watchers are warning of a surge in CryptoWall ransomware victims this month that will coincide with a campaign to spread a new variant of the malware though advertising networks.
Cyber Security: Not Just a Technical Challenge Anymore News on mass and major data breaches is becoming more and more frequent, and these sometimes-daily reports have somehow surprisingly lost on us the huge reach and effects they represent. Society seems to have become numb to this issue. Many believe that…
Snapchat Photo Leak Shines a Light on Vulnerable Third-Party Apps After a massive photo leak dubbed “The Snappening” exposed an estimated 200,000 images from Snapchat users, the company took to Twitter and their blog to make something clear: the attack was carried out against a third-party app, not Snapchat itself.
HIGH-LEVEL CYBERCRIMES TO BE PROSECUTED IN THE US United States experienced large number of attacks in the recent years. As organized cyberattacks continue to plague the United States, the Department of Justice hopes to shift focus towards prosecuting cybercriminals.
Russian Tor exit node patches with malware the files downloaded Once again Tor network is under attack, the researcher Josh Pitts of Leviathan Security Group has identified a Tor exit node that was used to patch the binaries downloaded by the users, the threat actors were adding malware to the…
Why You Must Hacker-Proof Your Employees: Creating a Secure Corporate Culture If you’re a CTO or a network admin, you’ve probably memorized some of the basics of network security. Have lots of well-configured firewalls and IDS/IPS devices. Use switches instead of hubs. Make sure everyone uses complex passwords and make…