Dark Reading: Attacks/Breaches
Inside Incident Response: 6 Key Tips to Keep in Mind
Fri, 22 Mar 2019 14:30:00 EDT
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.
Two Found Guilty in Online Dating, BEC Scheme
Fri, 22 Mar 2019 11:55:00 EDT
Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.
Security Lessons from My Game Closet
Fri, 22 Mar 2019 10:30:00 EDT
In an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board games.
Hacker AI vs. Enterprise AI: A New Threat
Thu, 21 Mar 2019 14:30:00 EDT
Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use.
Police Federation of England and Wales Suffers Apparent Ransomware Attack
Thu, 21 Mar 2019 13:10:00 EDT
National Cyber Security Centre and National Crime Agency investigate random attack that locked down the association's data and deleted backups.
What the Transition to Smart Cards Can Teach the US Healthcare Industry
Thu, 21 Mar 2019 10:30:00 EDT
Healthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that.
BEC Scammer Pleads Guilty
Wed, 20 Mar 2019 14:35:00 EDT
Business email compromise (BEC) operation resulted in $100 million in losses to a multinational technology company and a social media firm, according to the US Attorney's Office.
Google Photos Bug Let Criminals Query Friends, Location
Wed, 20 Mar 2019 14:30:00 EDT
The vulnerability, now patched, let attackers query where, when, and with whom victims' photos were taken.
The Insider Threat: It's More Common Than You Think
Wed, 20 Mar 2019 14:30:00 EDT
A new study shows why security teams must look holistically across cybersecurity, compliance, technology, and human resources to truly address the business effects of workforce risk.
'Critical' Denial-of-Service Bug Patched in Facebook Fizz
Wed, 20 Mar 2019 12:00:00 EDT
Researchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol.
TLS 1.3: A Good News/Bad News Scenario
Wed, 20 Mar 2019 10:30:00 EDT
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.
DDoS Attack Size Drops 85% in Q4 2018
Tue, 19 Mar 2019 16:25:00 EDT
The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.
The Case of the Missing Data
Tue, 19 Mar 2019 14:30:00 EDT
The latest twist in the Equifax breach has serious implications for organizations.
Norsk Hydro Shuts Plants Amid Ransomware Attack
Tue, 19 Mar 2019 13:20:00 EDT
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.
Stealing Corporate Funds Still Top Goal of Messaging Attacks
Tue, 19 Mar 2019 11:00:00 EDT
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.
Crowdsourced vs. Traditional Pen Testing
Tue, 19 Mar 2019 10:30:00 EDT
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.
New Europol Protocol Addresses Cross-Border Cyberattacks
Mon, 18 Mar 2019 15:45:00 EDT
The protocol is intended to support EU law enforcement in providing rapid assessment and response for cyberattacks across borders.
Are You Prepared for a Zombie (Domain) Apocalypse?
Mon, 18 Mar 2019 10:30:00 EDT
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.
On Norman Castles and the Internet
Fri, 15 Mar 2019 10:30:00 EDT
When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?
Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites
Thu, 14 Mar 2019 20:45:00 EDT
New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.