Cyber Security News

We have a collection of recent cyber security news articles from around the planet. We have attempted to create a one stop place which you can use by aggregating feeds from what we consider the top sources of cyber security related news. Browse through these articles and  you can quickly see how prevalent the cyber security problem has become.

 

  • Ransomware: Do you pay the ransom? | Salted Hash Ep 19
    Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-19
  • Microsoft is distributing security patches through insecure HTTP links
    The Microsoft Update Catalog uses insecure HTTP links – not HTTPS links – on the download buttons, so patches you download from the Update Catalog are subject to all of the security problems that dog HTTP links, including man-in-the-middle attacks.Security researcher Stefan Kanthak, writing on Seclist’s Bugtraq mailing list, elaborates: ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-16
  • Microsoft’s free analytics service sniffs out Meltdown, Spectre patch status
    Microsoft's free Windows Analytics service now scans enterprise Windows 7, Windows 8.1 and Windows 10 PCs, and reports whether they've been updated to defend against potential attacks exploiting the Meltdown and Spectre processor vulnerabilities.The new capabilities of Windows Analytics' "Upgrade Readiness" were announced Tuesday by Terry Myerson, the top Windows ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-15
  • New EU Privacy Law May Weaken Security
    Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to ... Read more
    Source: Krebs on SecurityPublished on 2018-02-15
  • February patches bring ominous Outlook fixes and a rebirth of KB 2952664
    The very early reports are in, and it looks like this month’s monstrous panoply of patches isn’t as destructive as last month’s – so far, at least. Aside from a few reported incompatibilities, the big news involves two Outlook security holes that kick in when you download email, or preview ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-14
  • Mac: What does ‘System Scan is Recommended’ mean?
    Many Mac users may have come across a small window that appears on top of their browser when surfing the Web that warns them, ‘System Scan is Recommended’. So, what is this message, and what should you do if you see it?TL;DR: Don't panic The first thing to learn is ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-14
  • Microsoft to cover Windows 7 with advanced threat service
    Microsoft plans to extend support for its Windows Defender ATP service to devices running older operating systems, including Windows 7.The decision, announced this week, is a turn-about for Microsoft, which had limited the service to Windows 10 machines. In a post to a company blog, a Microsoft director cited customers' ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-14
  • Microsoft Patch Tuesday, February 2018 Edition
    Microsoft today released a bevy of security updates to tackle more than 50 serious weaknesses in Windows, Internet Explorer/Edge, Microsoft Office and Adobe Flash Player, among other products. A good number of the patches issued today ship with Microsoft’s “critical” rating, meaning the problems they fix could be exploited remotely ... Read more
    Source: Krebs on SecurityPublished on 2018-02-13
  • Microsoft wants to use blockchain to secure your identity
    Microsoft is working to create a blockchain-based, decentralized digital identity management platform that would allow users to own and secure access to their online persona via an encrypted database hub.Over the past year, Microsoft said it has been exploring how to use Blockchain and other distributed ledger technologies to create new types ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-13
  • Microsoft to test blockchain-based self-sovereign ID system
    Microsoft is working to create a blockchain-based, decentralized digital identity management platform that would allow users to own and secure access to their online persona via an encrypted database hub.Over the past year, Microsoft said it has been exploring how to use Blockchain and other distributed ledger technologies to create new types ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-13
  • Chrome 68 to condemn all unencrypted sites by summer
    Google has put a July deadline on a 2016 promise that its Chrome browser would tag all websites that don't encrypt their traffic."Beginning in July 2018 with the release of Chrome 68, Chrome will mark all HTTP sites as 'not secure,'" wrote Emily Schechter, a Chrome security product manager, in ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-13
  • Get Windows Update locked down in preparation for this month’s problems
    January 2018 will go down in history as one of the worst patching months in Microsoft’s very checkered history. That isn’t an isolated muck-up. It’s a harbinger. We had a couple of really bad months in 2017 — February and November come immediately to mind — but an unconscionable number of ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-12
  • Domain Theft Strands Thousands of Web Sites
    Newtek Business Services Corp. [NASDAQ:NEWT], a Web services conglomerate that operates more than 100,000 business Web sites and some 40,000 managed technology accounts, had several of its core domain names stolen over the weekend. The theft shut off email and stranded Web sites for many of Newtek’s customers. An email ... Read more
    Source: Krebs on SecurityPublished on 2018-02-12
  • Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18
    Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-12
  • Mobile app management is being driven by unmanaged devices
    The need to manage applications on unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile app management (MAM) software and services, according to a new Gartner report.By 2021, 60% of mobile apps being used in the enterprise will rely on at least one app-level management control, ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-12
  • Governments eye their own blockchain cryptocurrencies
    Last year's blockchain pilot projects are rapidly becoming this year's live implementations in a variety of industries, and even sectors that have until now been vexed by the distributed ledger technology are following suit.Case in point: Governments, which are moving to regulate blockchain technology and the cryptocurrencies it underpins.Cryptocurrencies such ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-09
  • U.S. Arrests 13, Charges 36 in ‘Infraud’ Cybercrime Forum Bust
    The U.S. Justice Department announced charges on Wednesday against three dozen individuals thought to be key members of ‘Infraud,” a long-running cybercrime forum that federal prosecutors say cost consumers more than a half billion dollars. In conjunction with the forum takedown, 13 alleged Infraud members from the United States and ... Read more
    Source: Krebs on SecurityPublished on 2018-02-08
  • Would You Have Spotted This Skimmer?
    When you realize how easy it is for thieves to compromise an ATM or credit card terminal with skimming devices, it’s difficult not to inspect or even pull on these machines when you’re forced to use them personally — half expecting something will come detached. For those unfamiliar with the ... Read more
    Source: Krebs on SecurityPublished on 2018-02-06
  • Spectre and Meltdown | Salted Hash Ep 17
    What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-06
  • Why Linux is better than Windows or macOS for security
    Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations center. They of course use firewalls and antivirus tools. They probably spend a lot of time monitoring their networks, looking for telltale anomalies that could indicate a breach. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-06
  • Apple’s iOS push could change healthcare data sharing, still won’t kill the fax
    Apple's Health Records feature in the upcoming iOS 11.3 rollout may be the most high-profile attempt at sharing healthcare data between caregiver and patient, but it won't succeed without industry's cooperation.What is new is the mass market Apple commands with its iPhone and iPad and the company's efforts to take ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-05
  • Alleged Spam Kingpin ‘Severa’ Extradited to US
    Peter Yuryevich Levashov, a 37-year-old Russian computer programmer thought to be one of the world’s most notorious spam kingpins, has been extradited to the United States to face federal hacking and spamming charges. Levashov, in an undated photo. Levashov, who allegedly went by the hacker names “Peter Severa,” and “Peter ... Read more
    Source: Krebs on SecurityPublished on 2018-02-05
  • Hold your breath, avoid the snake oil, and get Windows updated
    January 2018 was a month that will go down in patching infamy. Looking back on my notes, we had patches released, yanked, re-released and/or re-re-released on 15 different days in January. Untold thousands of machines were bricked by Microsoft patches. Millions of hours were lost chasing down bad patches and ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-05
  • Apple provides superior cybersecurity protection
    Apple has kept CEO Tim Cook’s enterprise security promise, and in doing so staked space in one of the few growing sectors of the insurance market, revealing a new enterprise-focused cybersecurity offering bought to market with Cisco, Aon and Allianz.To read this article in full, please click here ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-02-05
  • Attackers Exploiting Unpatched Flaw in Flash
    Adobe warned on Thursday that attackers are exploiting a previously unknown security hole in its Flash Player software to break into Microsoft Windows computers. Adobe said it plans to issue a fix for the flaw in the next few days, but now might be a good time to check your ... Read more
    Source: Krebs on SecurityPublished on 2018-02-02
  • Why Google partnered with MobileIron – and what they plan to offer
    Google Cloud and MobileIron have announced a partnership to provide a secure enterprise applications and services portal.Why Google Cloud and MobileIron? Because Google wants to use its Orbitera commerce platform, which enables the buying and selling of software and services in the cloud – and it needs an OS- and ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-01-31
  • Why Google partnered with MobileIron and what they want to offer you
    Google Cloud and MobileIron have announced a partnership to provide a secure enterprise applications and services portal.Why does Google Cloud and MobileIron? Google wants to use its Orbitera commerce platform, which enables the buying and selling of software and services in the cloud and it needs an OS- and hardware ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-01-31
  • Perfect end to a perfect month: Yet another Win10 1709 cumulative update, KB 4058258
    Microsoft told us three weeks ago that Win10 Fall Creators Update, version 1709, was ready for enterprise deployment. Since then, we’ve seen the early January patch yanked because it tanked AMD machines. Then, after the first patch was reinstated, we got two more cumulative updates. In the past three weeks.I ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-01-31
  • Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US
    On Jan. 27, 2018, KrebsOnSecurity published what this author thought a scoop about the first known incidence of U.S. ATMs being hit with “jackpotting” attacks, a crime in which thieves deploy malware that forces cash machines to spit out money like a loose Las Vegas slot machine. As it happens, ... Read more
    Source: Krebs on SecurityPublished on 2018-01-30
  • Multiple vulnerabilities in 7-Zip. Get it updated now!
    Late last year, landave, a self-described “Computer Science student enjoying cryptography, reverse engineering, and other information security topics,” discovered two startling security holes in 7-Zip, a free zip program I’ve recommended for years. To read this article in full, please click here ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2018-01-30