The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.
The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.
And 50 percent don't audit privileged account activity, a recent survey found.
'Organizations need to take steps to safeguard their data from ransomware attacks,' says Office for Civil Rights director Jocelyn Samuels.
Still, 79 percent of companies lack comprehensive strategies to detect and mitigate such attacks, a recent survey found.
Patch management software automates patch management, one of the most important security tasks in any organization.
And just 25 percent are completely confident in their ability to handle security incidents, a recent survey found.
Why can't web gateways fully protect you from attack and how can you maximize their performance?
Hillary Clinton's email scandal offers a reminder of the importance of data protection best practices, like the three we cover here.
War Gaming teams up developers, operations and security personnel to launch attacks upon their own applications, systems and networks.
The three recent breaches exposed thousands of customers' personal and payment card information.
The attacks appear to have been enabled by the theft of third-party service providers' remote access credentials.
And just 14 percent of SMBs see their ability to mitigate cyber attacks as highly effective, a recent survey found.
Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.
And 67 percent of IT professionals have no cyber security certifications, a recent survey found.
Approximately 4,300 patients' names, birthdates and Social Security numbers were exposed.
The cameras, located in 105 countries, delivered as many as 50,000 HTTP requests per second.
Approximately 57 percent of all organizations using Office 365 were hit by the attack.
Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.
Ransomware is a favored tool for hackers. Three tips can help you proactively remove ransomware attack vectors.
Both attacks leveraged email addresses and password stolen from other sites.
Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.
The suit was filed by Veridian Credit Union on behalf of all U.S. financial institutions whose customers were affected by the data breach.
Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.
Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?