As organizations become more and more digitally connected, concerns about secure access seem to loom larger than ever. With more users connecting to more resources, how can organizations ensure people requesting access are who they say they are? read more
The Open Technology Institute (OTI) has responded to GCHQ/NCSC's article on 'Principles for a More Informed Exceptional Access Debate' with an 'Open Letter to GCHQ on the Threats Posed by the Ghost Proposal'. read more
A data breach at billing collections service provider American Medical Collection Agency (AMCA) could impact many of the company’s customers. One victim is medical testing firm Quest Diagnostics and roughly 12 million of its patients. read more
The authors of the GandCrab ransomware have reportedly announced on underground forums that they are closing their operation after claiming that they have earned over $150 million a year. read more
Having trouble getting CA certificates installed and recognized in Ubuntu Server? Find out how it's done with a few quick commands.
A group of researchers has devised a new proof-of-concept attack that targets the touchscreen of Near-Field Communication (NFC)-enabled mobile devices such as smartphones and allows remote control of the devices. read more
An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw.
Luxembourg-based laboratory testing services giant Eurofins Scientific on Monday revealed that some of its IT systems have been infected with a piece of ransomware. read more
After a year of success, its operators say they earned millions -- and are ready to retire.
Academic outfit U-turns on blacklisting Chinese bogeyman The US-based Institute of Electrical and Electronics Engineers (IEEE) has lifted its sanctions on Huawei-linked academic reviewers.…
Despite the risks, 90% of business leaders said they lack the resources to defend against a cyber attack, according to a Nominent report.
Several vulnerabilities have been found and patched in the Kace K1000 systems management appliance from Quest. read more
There will be no lack of interesting content from Qualys at Infosecurity Europe 2019 this year. Depending on you interests, you might want to make time for some of these talks and presentations. Visit Qualys at stand L100 to hear best practices presentations from industry leaders. Tuesday, June 4 10:00 – 10:15 AM Gain Unprecedented Visibility with Global IT Asset Inventory Cyrus Tata, Technical Account Manager, Qualys The digital transformation and the ever-evolving cybersecurity threat … More → The post Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders appeared first on Help Net Security.
Considering global market demand for independent and standardized payment solutions, G+D Mobile Security and IDEMIA want to create the White Label Alliance (WLA) to provide a new security solution for next generation payment applications. The solution will be based on White Label EMV specifications and will enable ready-to-deploy solutions for domestic payment schemes and closed-loop worldwide. The new alliance is a response to the growing global demand for new, next-generation independent payment solutions. By providing … More → The post White Label Alliance to provide a new security solution for next generation payment applications appeared first on Help Net Security.
Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Majove, despite mitigations.
CVE is a registered MITRE Corporation trademark and MITRE's CVE website is the authoritative source of CVE content. CWE is a registered MITRE Corporation trademark and MITRE's CWE website is the authoritative source of CWE content.