Cyber Security News

We have a collection of recent cyber security news articles from around the planet. We have attempted to create a one stop place which you can use by aggregating feeds from what we consider the top sources of cyber security related news. Browse through these articles and  you can quickly see how prevalent the cyber security problem has become.

 

  • MobileIron adds Apple security along with support for iOS 11
    Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • It’s time for IT to take control of mobile apps
    IT is seeing a very dangerous collision of two trends: BYOD and mobile apps. IT's job is, among other things, to protect corporate data, a portion of the company's intellectual property. And yet easily downloaded consumer apps are threatening that data security by sharing their sensitive data with mobile apps ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Tech Talk: Pricey iPhones, intent-based networks, GPS spoofing and smartwatches
    Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • It’s time to install August Windows and Office patches — carefully
    August was a banner month for Windows and Office customers. If I counted correctly, we saw patches on 14 different days last month. The current list of outstanding problems with those patches weighs heavily on my mind, but with the first September non-security Office patches due today, and the September ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Who Is Marcus Hutchins?
    In early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in the security community until May 2017 when the U.K. media ... Read more
    Source: Krebs on SecurityPublished on 2017-09-05
  • Down memory lane — and into a ditch
    One of this pilot fish's most memorable users is a sales guy who has security issues using his PC -- mainly, locking himself out because he can't remember his password."In the past, he would repeatedly get locked out of his computer for entering wrong passwords," says fish. "I eventually changed ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3
    The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Why should enterprises care about intent-based networking? | Tech Talk Ep 1, Pt 2
    The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Is the smartwatch market dead? | Tech Talk Ep 1, Pt 1
    Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market. ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Will the new iPhone break the $1,000 barrier? | Tech Talk Ep 1, Pt 4
    The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock? ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-09-05
  • Email to Essential smartphone users causes alarm
    The term “improperly configured” is a real plague on the IT landscape.It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.Essential phone recently sent an email to customers asking for proof ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-31
  • One big lesson from the Essential smartphone email fiasco
    The term “improperly configured” is a real plague on the IT landscape.It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.Essential phone recently sent out an email to customers asking for ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-31
  • Twitter Bots Use Likes, RTs for Intimidation
    I awoke this morning to find my account on Twitter (@briankrebs) had attracted almost 12,000 new followers overnight. Then I noticed I’d gained almost as many followers as the number of re-tweets (RTs) earned for a tweet I published on Tuesday. The tweet stated how every time I tweet something related to ... Read more
    Source: Krebs on SecurityPublished on 2017-08-30
  • Microsoft patch alert: Outstanding problems with recent updates
    August has seen a flurry of buggy patches:Win10 1607KB 4033637, which arrived last Friday via Auto Update, is still undocumented. A Reddit thread credits Microsoft as saying it’s a July security patch for Flash. Abbodi86 on AskWoody has a different view: it’s an update to the Compatibility Appraiser, ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-30
  • Success! (in more ways than one)
    Government office is rolling out remote desktop connections over VPN for some of its users, and not everyone is jumping on board, reports a pilot fish working there."I was staffing our support desk when one of these users called in from home, two weeks after we had set up the ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-30
  • Android 8.0 in-depth: Oreo’s not-so-obvious security enhancements
    When you read about a splashy new software update like Google's fresh-from-the-oven Android 8.0 Oreo release, you tend to hear mostly about the marquee features — the most attention-grabbing elements and refinements you're likely to notice when you get the update on your own device.It's understandable, since those are the ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-29
  • Beware of Hurricane Harvey Relief Scams
    U.S. federal agencies are warning citizens anxious to donate money for those victimized by Hurricane Harvey to be especially wary of scam artists. In years past we’ve seen shameless fraudsters stand up fake charities and other bogus relief efforts in a bid to capitalize on public concern over an ongoing disaster. ... Read more
    Source: Krebs on SecurityPublished on 2017-08-29
  • Microsoft yanks buggy patch of a buggy patch, KB 4039884
    There’s no official confirmation, and no explanation of course, but overnight Microsoft pulled a patch that was supposed to fix the main problems in this month’s Windows 7 security updates. I talked about the repair hotfix yesterday in "Microsoft repairs buggy Win7 security patch with buggy hotfix KB 4039884." Today, ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-29
  • Tech Firms Team Up to Take Down ‘WireX’ Android DDoS Botnet
    A half dozen technology and security companies — some of them competitors — issued the exact same press release today. This unusual level of cross-industry collaboration caps a successful effort to dismantle ‘WireX,’ an extraordinary new crime machine comprising tens of thousands of hacked Android mobile devices that was used this month to ... Read more
    Source: Krebs on SecurityPublished on 2017-08-28
  • Microsoft repairs buggy Win7 security patch with buggy hotfix KB 4039884
    Two weeks ago, I talked about a bug in Windows 7’s August Monthly patch rollup KB 4034664 that left many people who have two monitors reeling. After installing the security patch, the first monitor would work properly, but the second monitor could have all sorts of rendering problems.Günter Born had ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-28
  • Microsoft repairs buggy Win7 security patch with buggy hotfix KB 4039884
    Two weeks ago, I talked about a bug in Windows 7’s August Monthly patch rollup KB 4034664 that left many people who have two monitors reeling. After installing the security patch, the first monitor would work properly, but the second monitor could have all sorts of rendering problems.Günter Born had ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-28
  • ‘You’ is the new ‘Not-you’
    This medical practice rolls out a new system, and when it's done everyone has the same randomly generated temporary password, reports a pilot fish on the scene."I sent an email to all staff, reminding them to change their password from the temporary one that was assigned by the vendor," fish ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-28
  • ‘You’ is the new ‘Not-you’
    This medical practice rolls out a new system, and when it's done everyone has the same randomly generated temporary password, reports a pilot fish on the scene."I sent an email to all staff, reminding them to change their password from the temporary one that was assigned by the vendor," fish ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-28
  • Is Your Mobile Carrier Your Weakest Link?
    More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security ... Read more
    Source: Krebs on SecurityPublished on 2017-08-27
  • Why It’s Still A Bad Idea to Post or Trash Your Airline Boarding Pass
    An October 2015 piece published here about the potential dangers of tossing out or posting online your airline boarding pass remains one of the most-read stories on this site. One reason may be that the advice remains timely and relevant: A talk recently given at a Czech security conference advances ... Read more
    Source: Krebs on SecurityPublished on 2017-08-24
  • The paranoid Windows traveler’s data-protection checklist
    It used to be that the most intrusive experience business travelers faced at airport security was a possible pat-down, or a customs check of luggage. These days, border control agents are searching passengers’ phones, tablets and laptops for … well, anything they want to see. Your complying with the request ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-23
  • The paranoid Windows traveler’s data-protection checklist
    It used to be that the most intrusive experience business travelers faced at airport security was a possible pat-down, or a customs check of luggage. These days, border control agents are searching passengers’ phones, tablets and laptops for … well, anything they want to see. Your complying with the request ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-23
  • Dumping Data from Deep-Insert Skimmers
    I recently heard from a police detective who was seeking help identifying some strange devices found on two Romanian men caught maxing out stolen credit cards at local retailers. Further inspection revealed the devices to be semi-flexible data transfer wands that thieves can use to extract stolen ATM card data ... Read more
    Source: Krebs on SecurityPublished on 2017-08-22
  • Is mobile killing the LAN?
    I was talking with an industry CEO the other day, and he offered an intriguing thought. He said the LAN is dead — along with its associated routers and hubs and other network hardware — and that mobile has killed it. But the LAN isn’t dead, I resisted, noting that ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-22
  • Is mobile killing the LAN?
    I was talking with an industry CEO the other day and he offered an intriguing thought. He said that the LAN is dead — along with its associated routers and hubs and other network hardware — and that mobile has killed it. But the LAN isn’t dead, I resisted, noting ... Read more
    Source: Computerworld Cybercrime and HackingPublished on 2017-08-22