Computer Security Tip of the Day
January 24th
The Dark Web is a network of systems connected to the Internet designed to share information securely and anonymously. These capabilities are abused by cyber criminals to enable their activities, for example selling hacking tools or purchasing stolen inf…
Bruce Schneier on Security
January 23rd
This is new from Reuters: More than two years ago, Apple told the FBI that it planned to offer users end-to-end encryption when storing their phone data on iCloud, according to one current and three former FBI officials and one current and one former Appl…
January 22nd
It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November. Useful for anyone putting together a bot network: A hacker has published this week a massive list of Telnet credentials for more than 515,000 …
January 22nd
Glenn Greenwald has been charged with cybercrimes in Brazil, stemming from publishing information and documents that were embarrassing to the government. The charges are that he actively helped the people who actually did the hacking: Citing intercepted m…
January 21st
SIM hijacking -- or SIM swapping -- is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control. Since your smartphone often serves as a security measure or backup verification sy…
January 21st
The New York Times has a long story about Clearview AI, a small company that scrapes identified photos of people from pretty much everywhere, and then uses unstated magical AI technology to identify people in other photos. His tiny company, Clearview AI, …
Dark Reading Security News
January 18th
Fraudulent emails tell recipients their W-2 forms are ready and prompt them to click malicious links.
January 17th
Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches -- so start protecting your business now.
January 16th
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.
January 7th
How California's new privacy law increases the liability for securing Web-facing user data, and what enterprises can do to mitigate their risk.
January 3rd
The California Consumer Privacy Act is in full effect, prompting organizations to think about how they'll remain compliant.
New Security Threats
January 24th
The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.
January 24th
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
January 24th
The malware uses thousands of partner websites to spread malvertising code.
January 24th
The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.
January 23rd
New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.