Cybercriminals Could be Coming After Your Coffee
October 23 2020Researchers show no IoT device is too small to fall victim to ransomware techniques.
Read moreResearchers show no IoT device is too small to fall victim to ransomware techniques.
Read moreFBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.
Read moreEthical use will require some combination of consistent reporting, regulation, corporate responsibility, and adversarial technology.
Read more
There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it.
This report documents...
Read more
Listen to the latest Naked Security podcast!
Read moreKashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence.
Read moreSome of the world's largest Internet firms have taken steps to crack down on disinformation spread by QAnon conspiracy theorists and the hate-filled anonymous message board 8chan. But according...
Read moreFlaws allow attackers to manipulate URLs users see on their mobile devices, Rapid7 says
Read moreBut that's not the only type of web attack cybercriminals have been profiting from.
Read moreThe Logonizer login security plug-in was automatically updated to patch a SQL injection vulnerability.
Read more
Recent Comments