More than half of the top 1 million websites use HTTPS, researchers report, but not all encrypted traffic is safe. Cybercriminals are increasingly relying on SSL certificates to lull...
Read moreMobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right. During this coronavirus pandemic, using mobile phones as...
Read moreMobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right. During this coronavirus pandemic, using mobile phones as...
Read moreChinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
April 8 2020Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says. Five related threat groups that for the past decade have...
Read moreChinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
April 8 2020Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says. Five related threat groups that for the past decade have...
Read moreMicrosoft Buys Corp.com So Bad Guys Can’t
April 8 2020In February, KrebsOnSecurity told the story of a private citizen auctioning off the dangerous domain corp.com for the starting price of $1.7 million. Domain experts called corp.com dangerous because...
Read morePhishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks. Cybercriminals are exploiting fears around the COVID-19 pandemic to tailor their...
Read morePhishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks. Cybercriminals are exploiting fears around the COVID-19 pandemic to tailor their...
Read more9 Security Podcasts Worth Tuning In To
April 7 2020Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry. (Image: Boyarkina Marina — stock.adobe.com) The cybersecurity industry changes every day, sometimes multiple times a day,...
Read more
Recent Comments