Cyber Security News

We have a collection of recent cyber security news articles from around the planet. We have attempted to create a one stop place which you can use by aggregating feeds from what we consider the top sources of cyber security related news. Browse through these articles and  you can quickly see how prevalent the cyber security problem has become.

 

  • Word to the wise
    IT pilot fish gets an email from a person who's a member of a club they both belong to -- and while it's not work-related, it was clearly sent from work."The email had been written as a Word document and, since I wasn't using a Windows-based computer, I opened it ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-11-03
  • Equifax Reopens Salary Lookup Service
    Equifax has re-opened a Web site that lets anyone look up the salary history of a large portion of the American workforce using little more than a person’s Social Security number and their date of birth. The big-three credit bureau took the site down just hours after I wrote about ... Read more
    Source: Krebs on SecurityPublished on 2017-11-02
  • Tech Talk: The technology that scares us
    The scary thing about technology is that every day can be Halloween when it comes to what worries us in thids hyperpast digital age.Whether it's the flippant fear that your shiny new device might never show up, more realistic worries that Alexa or Google Home or even Apple's Siri might ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-11-01
  • Tech Talk: The technology that scares us
    Whether it's from the loss of privacy from Alexa or Google Home, fake news on social media or A.I., the future could be a tech dystopia. Our tech panel looks at where we are, where we're going, what what keeps us up at night. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-11-01
  • What is Face ID? Apple’s new facial recognition tech explained
    With just a glance, Face ID can unlock Apple's new iPhone X, giving owners a new authentication paradigm for the first time since the arrival of Touch ID with the iPhone 5. Face ID – that's Apple's name for the technology – uses a complex front-facing camera system and accompanying ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-11-01
  • What is Face ID? Apple’s new authentication tech explained
    With just a glance, Face ID can unlock Apple's new iPhone X, giving owners a new authentication paradigm for the first time since the arrival of Touch ID with the iPhone 5. Face ID – that's Apple's name for the technology – uses a complex front-facing camera system and accompanying ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-11-01
  • Apple putties Krack in macOS, iOS
    Apple on Tuesday patched both macOS and iOS against serious vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.Information about the flaws, dubbed "Krack" by their Belgian discoverer, made news earlier in the month when security researcher Mathy Vanhoef announced weaknesses in WPA2 that could ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-31
  • Fear the Reaper, or Reaper Madness?
    Last week we looked at reports from China and Israel about a new “Internet of Things” malware strain called “Reaper” that researchers said infected more than a million organizations by targeting newfound security weaknesses in countless Internet routers, security cameras and digital video recorders (DVRs). Now some botnet experts are calling ... Read more
    Source: Krebs on SecurityPublished on 2017-10-27
  • Get Windows and Office patched – but watch out for creepy-crawlies
    Those of us who have to keep Windows 10 working have hit yet another rough course. This month’s patches haven’t been pretty. In fact, if your admin set the WSUS or SCCM update servers to automatically approve Windows 10 updates, you may have had to deal with oceans of blue ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-27
  • Throwback Thursday: Whose idea was this, anyway?
    This pilot fish is in charge of computing facility operations, and he takes security seriously."As part of trying to do the 'right' thing, I instituted some policies, such as regular password changes, regular checks and purges of our password files, group files and user database," says fish.But he knows that, ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-26
  • Dell Lost Control of Key Customer Support Domain for a Month in 2017
    A Web site set up by PC maker Dell Inc. to help customers recover from malicious software and other computer maladies may have been hijacked for a few weeks this summer by people who specialize in deploying said malware, KrebsOnSecurity has learned. There is a program installed on virtually all Dell ... Read more
    Source: Krebs on SecurityPublished on 2017-10-24
  • Reaper: Calm Before the IoT Security Storm?
    It’s been just over a year since the world witnessed some of the world’s top online Web sites being taken down for much of the day by “Mirai,” a zombie malware strain that enslaved “Internet of Things” (IoT) devices such as wireless routers, security cameras and digital video recorders for ... Read more
    Source: Krebs on SecurityPublished on 2017-10-23
  • Now THAT’S what we call security!
    IT consultant gets a gig doing work for a government agency that frequently handles top-secret documents -- and it gets a bit surreal at times, reports a pilot fish in the know."When Fred would get to work, a guard armed with an assault rifle would turn on a red light," ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-23
  • Anatomy of a spambot
    For security pros, spambots are known enemies. For the uninitiated, they are unknown entities. And yet they proliferate like ants at a picnic or teens on messaging apps. You might be receiving countless messages from bots every day, and even worse, a bot might be sending out unwanted emails from ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-19
  • What is blockchain? Get up to speed with this video primer
    Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-19
  • 48% off Kidde Carbon Monoxide Alarm with Display and 10 Year Battery – Deal Alert
    Carbon Monoxide is odorless, tasteless and invisible, and it accounts for over 72,000 cases of poisoning each year. Kidde calls their C3010D model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 seconds. The unit will chirp ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-18
  • 4 old malware threats still haunting business today
    From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-17
  • Excel, Access, external DB driver errors linked to this month’s patches
    I’m seeing many reports, in various locations, about this month’s Windows security patches breaking custom programs that import and export Excel XLS files. Programs that have worked for years are suddenly, mysteriously, turning belly-up. The most common symptom is an error message that says “Unexpected error from external database driver” ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-17
  • Amazon wants to deliver groceries to your car trunk — not a good idea
    In the minds of mobile shoppers, where is the line between convenience and personal space/privacy? We now have two retailers — Walmart and Amazon, the giants of in-store and online shopping, respectively — separately testing programs to deliver purchases directly into your home or your car trunk when the shopper ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-17
  • Microsoft shuts down Krack with sneaky Windows update
    Microsoft today revealed that it quietly patched Windows last week against vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.Details of the security update were only published Monday to Microsoft's Security Update Guide, the catalog-like portal that earlier this year replaced the decades-old practice of ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-16
  • Microsoft shuts down Krank with sneaky Windows update
    Microsoft today revealed that it quietly patched Windows last week against vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.Details of the security update were only published Monday to Microsoft's Security Update Guide, the catalog-like portal that earlier this year replaced the decades-old practice of ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-16
  • What You Should Know About the ‘KRACK’ WiFi Security Weakness
    Researchers this week published information about a newfound, serious weakness in WPA2 — the security standard that protects all modern Wi-Fi networks. What follows is a short rundown on what exactly is at stake here, who’s most at-risk from this vulnerability, and what organizations and individuals can do about it. ... Read more
    Source: Krebs on SecurityPublished on 2017-10-16
  • Microsoft shuts down Krank with emergency Windows update
    Microsoft today issued an emergency Windows security update to patch vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.Details of the security update were published to Microsoft's Security Update Guide, the catalog-like portal that earlier this year replaced the decades-old practice of delivering explanatory bulletins.All ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-16
  • Don’t be the fool in the cloud
    When I hear people worrying about cloud security, they’re usually shaking in their boots about some obscure bug beyond their control. Ha! Ordinary, stupid human mistakes are more than bad enough.For example, Accenture left hundreds of gigabytes of private user and corporate data on four unsecured Amazon Web Services (AWS) ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-16
  • Krebs Given ISSA’s ‘President’s Award’
    KrebsOnSecurity was honored this month with the 2017 President’s Award for Public Service from the Information Systems Security Association, a nonprofit organization for cybersecurity professionals. The award recognizes an individual’s contribution to the information security profession in the area of public service. It’s hugely gratifying to have received this ... Read more
    Source: Krebs on SecurityPublished on 2017-10-16
  • Learn the ins and outs of Europe’s General Data Protection Regulation (GDPR)
    Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at CSPI. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-16
  • FinTech builds on blockchain for international mobile payments
    IBM has partnered with a Polynesian payments system provider and an open-source FinTech payment network to implement a new international exchange based on a blockchain electronic ledger.The new payment network uses IBM's Blockchain Platform, a cloud service, to enable the electronic exchange of 12 different currencies across Pacific Islands as well ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-15
  • Microsoft’s anti-malware sniffing service powers Edge to top spot in browser blocking tests
    Microsoft's Edge browser, the default in Windows 10, blocked a higher percentage of phishing and socially-engineered malware (SEM) attacks than Google's Chrome and Mozilla's Firefox, a Texas security testing firm said Friday.According to NSS Labs of Austin, Tex., Edge automatically blocked 92% of all in-browser credential phishing attempts and stymied ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-10-14
  • Equifax Credit Assistance Site Served Spyware
    Big-three consumer credit bureau Equifax says it has removed third-party code from its credit report assistance Web site that prompted visitors to download spyware disguised as an update for Adobe’s Flash Player software. Image: Randy-abrams.blogspot.com On Wednesday, security expert and blogger Randy Abrams documented how browsing a page at Equifax’s consumer information services ... Read more
    Source: Krebs on SecurityPublished on 2017-10-12
  • Hyatt Hotels Suffers 2nd Card Breach in 2 Years
    Hyatt Corp. is alerting customers about another credit card breach at some hotels, the second major incident with the hospitality chain in as many years. Hyatt said its cyber security team discovered signs of unauthorized access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed ... Read more
    Source: Krebs on SecurityPublished on 2017-10-12