Threats - Article Archives - Page 10

Using a Neural Network to Improve Social Spear Phishing

August 17, 2016 |

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

READ MORE

How to Hide Malware with a Digitally Signed Executable

August 16, 2016 |

Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.

READ MORE

MICROS Hackers Hit Five More POS Companies

August 15, 2016 |

The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.

READ MORE

DARPA's Machine Challenge Solves CrackAddr Puzzle

August 11, 2016 |

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

READ MORE

Russian Hackers Hit Oracle's MICROS POS

August 10, 2016 |

It's not yet clear how many customers may be affected.

READ MORE

Black Hat: What Are the Tools of Car Hacking?

August 08, 2016 |

Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]



READ MORE

3.7 Million People Affected by Massive Data Breach at Banner Health

August 05, 2016 |

A wide range of information was exposed, from credit card numbers to patient data.

READ MORE

Black Hat: Researchers Reveal PIN Pad Risks

August 04, 2016 |

PIN pads from multiple vendors are potentially at risk from attack, according to researchers from NCR. [VIDEO]

READ MORE

Hacking Hotel Keys and Point of Sale Systems at DEFCON

August 03, 2016 |

At DEFCON security researcher is set to reveal how magnetic stripes are at risk from exploitation.

READ MORE

88 Percent of All Ransomware Targets the Healthcare Sector

August 03, 2016 |

The education sector comes second at 6 percent, according to a recent report.

READ MORE

The Black Hat Kaminsky DNS Flaw: Eight Years Later

August 02, 2016 |

At Black Hat 2008, security researcher Dan Kaminsky revealed flaws in DNS that he claimed could have crippled the internet. Eight years later what was the real impact?

READ MORE

5 Freaky but Real Application Security Threats

July 28, 2016 |

There are some new application security threats in town, and they are pretty scary.

READ MORE

Clash of Kings Data Breach Exposes 1.6 Million Accounts

July 25, 2016 |

The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.

READ MORE

U.S. Dept. of Health and Human Services Publishes New Guidance on Ransomware

July 21, 2016 |

'Organizations need to take steps to safeguard their data from ransomware attacks,' says Office for Civil Rights director Jocelyn Samuels.

READ MORE

HackerOne Continues to Grow Bug Bounty Business [VIDEO]

July 08, 2016 |

Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.

READ MORE

3 Data Protection Tips, in Light of Proposed Cybersecurity Laws

July 07, 2016 |

Proposed cybersecurity legislation is making business owners nervous – with good reason. These tips will help you be prepared no matter what Congress does.

READ MORE

Massive Ransomware Attack Hits Millions of Microsoft Office 365 Users

June 29, 2016 |

Approximately 57 percent of all organizations using Office 365 were hit by the attack.

READ MORE

Hacker Selling 655,000 Stolen Medical Records for $700,000

June 28, 2016 |

The stolen records include full names, Social Security numbers, birthdates, mailing addresses and insurance information.

READ MORE

Acer Hacked

June 20, 2016 |

Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.

READ MORE

BluVector Takes Aim at Security Bug Hunting

June 17, 2016 |

[VIDEO] Former top IBM security exec, Kris Lovejoy, now president of BluVector by Acuity discusses what her new firm's tech is all about.

READ MORE