Security

Security news, trends, analysis and practical advice

FCC building in Washington

Senate votes to kill FCC's broadband privacy rules

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without permission.

NSA headquarters

Snowden's ex-boss offers advice on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency.

20160511 iotworld buddy lego city

Look before you leap: 4 hard truths about IoT

The internet of things still looks promising, with forecasts for billions of devices to solve all sorts of problems. But as promising as the technology is, it has shortcomings.

code programming software bugs cybersecurity

LastPass fixes serious password leak flaws

Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.

05 passwords

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs.

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

p1200588

Hackers demand $150K ransom, threaten to wipe millions of Apple devices

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them $150,000.

surveillance, spying, cameras, IP cameras

U.S. lawmakers question police use of facial recognition tech

U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.

woman on tablet with broken lock

Password-stealing flaws in LastPass Chrome and Firefox extensions

Critical vulnerabilities in the Chrome extension and Firefox add-on for LastPass could be exploited to steal passwords and remotely execute code.

150901 virgin atlantic london heathrow

UK follows U.S. ban of electronic devices in cabins on some flights

The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.

code programming software bugs cybersecurity

Flaws in Moodle CMS put thousands of e-learning websites at risk

Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

code programming software bugs cybersecurity

Cisco issues critical warning after CIA WikiLeaks dump bares IOS security weakness

A vulnerability in Cisco’s widely deployed IOS software that was disclosed in the recent WikiLeaks dump of CIA exploits has triggered the company to release a critical warning for its Catalyst networking customers.

airplane cabin Airbus plane

U.S. bans electronics larger than smartphones in cabins on some flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage,...

p1200649

Mozilla beats rivals, patches Firefox's Pwn2Own bug

Mozilla has already patched a Firefox vulnerability revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest.

Russia

Russia will strike U.S. elections again, FBI warns

Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.

Security online

Pwn2Own ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

1 threatening

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

girl hands privacy stop

Private photos of more celebrities leaked in Fappening 2.0

Photos and videos of more and more celebrities leak in the latest round The Fappening 2.0.

FBI Comey

FBI confirms probe of Russian hack of U.S. election, possible Trump involvement

The FBI is actively investigating Russia's attempts to influence the 2016 U.S. presidential election and possible cooperation from President Donald Trump's campaign, agency director James Comey confirmed.

Load More