Security News > 2018 > April
If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect...
Researchers have identified a hacking group behind several widescale maritime shipping industry business email compromise (BEC) attacks since June.
Russia's telecoms watchdog plans to probe Facebook before the end of the year after blocking access in the country to the popular messaging app Telegram, its head said on Wednesday. "We will...
Threat management and collaboration solutions provider Anomali announced a partnership with Visa to provide cyber security teams with intelligence on indicators of compromise (IoCs) drawn from...
The bad actors of cybersecurity have long shared their exploits, code, and methods with one other, while defenders largely worked in silos.
The focus of students, researchers, and professionals is migrating from computer science to machine learning, and it has a number of important implications.
As artificial intelligence algorithms become mission critical for more functions in society and business, we need tools to protect AI from tampering.
In 2016, KrebsOnSecurity exposed a network of phony Web sites and fake online reviews that funneled those seeking help for drug and alcohol addiction toward rehab centers that were secretly...
Digital fraudsters know humans are terrible at checking facts. A psychologist and researchers explain how better fact-checking may help foil cybercriminals' attempts at phishing.
Security Leaders Weigh on the Chances for SuccessSecurity experts are weighing in on whether a new alliance of four competing telecom companies formed to offer a portfolio of cybersecurity...