Computer Security Tip of the Day
August 17th
A common method cyber criminals use to hack into people's computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a lin…
SANS Institute - IT Security Whitepapers
Oops, it looks like you've entered an invalid feed address!
Dark Reading Security News
August 19th
Certification, endpoint security, 2FA, phishing, and PII were among the themes and puns offered by readers in our latest cartoon caption competition. And the winners are ...
August 18th
Simply applying file-based tools and expectations to fileless attacks is a losing strategy. Security teams must also understand the underlying distinctions between the two.
August 8th
Companies can squash the proliferation of shadow IT if they listen to employees, create transparent guidelines, and encourage an open discussion about the balance between security and productivity.
August 3rd
Regulatory penalties that exceed the cost of an extortion payout may lead to a new form of ransomware. These four steps can keep you from falling into that trap.
July 28th
Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.
New Security Threats
August 18th
The unpatched flaw would allow a bad actor to execute information-exfiltrating malware, backdoors, ransomware or any other kind of bad code he or she chose.
August 18th
A new email campaign includes a Microsoft Office Publisher file with malicious URLs leading to the FlawedAmmyy RAT.
August 18th
The issue impacts several content management systems, including Typo3 and WordPress, as well as widely-used PDF generation library TCPDF.
August 18th
Cryptocurrency angel investor Michael Terpin seeks damages for "gross negligence" by the carrier, alleging it turned a blind eye to store employees' malicious activities.
August 17th
An analysis of the world's most-visited websites shows that vulnerable software, too much active content and large amounts of code execution open visitors to a raft of potential dangers.