×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Threats - Article Archives - Page 10

3 Cases of InfoSec Hubris That Led to Big Breaches

September 15, 2016 |

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

READ MORE

World Anti-Doping Agency Breached by Russian Hackers

September 14, 2016 |

Confidential medical information for U.S. athletes including Simone Biles and Serena Williams was published online.

READ MORE

U.S. Small Businesses Lose $75 Billion a Year to Ransomware

September 09, 2016 |

Downtime resulting from ransomware attacks can cost companies more than $8,500 an hour, a recent survey found.

READ MORE

Mac Malware Part of Worsening Security Picture

September 02, 2016 |

While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.

READ MORE

68 Million Dropbox Account Credentials Exposed

September 01, 2016 |

The data comes from a breach dating back to mid-2012.

READ MORE

52 Percent of Hackers Would Help the FBI Hack the iPhone for a Fee

August 29, 2016 |

And nine percent would do it for free, a recent survey found.

READ MORE

Tech Vendors, Law Enforcement Team to Take on Ransomware

August 25, 2016 |

Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.

READ MORE

Using a Neural Network to Improve Social Spear Phishing

August 17, 2016 |

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

READ MORE

How to Hide Malware with a Digitally Signed Executable

August 16, 2016 |

Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.

READ MORE

MICROS Hackers Hit Five More POS Companies

August 15, 2016 |

The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.

READ MORE

DARPA's Machine Challenge Solves CrackAddr Puzzle

August 11, 2016 |

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

READ MORE

Russian Hackers Hit Oracle's MICROS POS

August 10, 2016 |

It's not yet clear how many customers may be affected.

READ MORE

Black Hat: What Are the Tools of Car Hacking?

August 08, 2016 |

Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]



READ MORE

3.7 Million People Affected by Massive Data Breach at Banner Health

August 05, 2016 |

A wide range of information was exposed, from credit card numbers to patient data.

READ MORE

Black Hat: Researchers Reveal PIN Pad Risks

August 04, 2016 |

PIN pads from multiple vendors are potentially at risk from attack, according to researchers from NCR. [VIDEO]

READ MORE

Hacking Hotel Keys and Point of Sale Systems at DEFCON

August 03, 2016 |

At DEFCON security researcher is set to reveal how magnetic stripes are at risk from exploitation.

READ MORE

88 Percent of All Ransomware Targets the Healthcare Sector

August 03, 2016 |

The education sector comes second at 6 percent, according to a recent report.

READ MORE

The Black Hat Kaminsky DNS Flaw: Eight Years Later

August 02, 2016 |

At Black Hat 2008, security researcher Dan Kaminsky revealed flaws in DNS that he claimed could have crippled the internet. Eight years later what was the real impact?

READ MORE

5 Freaky but Real Application Security Threats

July 28, 2016 |

There are some new application security threats in town, and they are pretty scary.

READ MORE

Clash of Kings Data Breach Exposes 1.6 Million Accounts

July 25, 2016 |

The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.

READ MORE