Security News > 2018

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the...

Proof-of-concept hack of a voicemail systems shows how it can lead to account takeovers multiple online services.

Personal details of nearly 1,000 North Korean defectors living in the South have been leaked in a hacking case, officials said Friday, exposing them to potential threats from the North. read more

Conference showcases cutting-edge cybersecurity research, hacking collectives and art.

Prosecutors in Japan Seek 10-Year Embezzlement Sentence for Mark KarpelesMark Karpeles, the former head of hacked Tokyo-based bitcoin exchange Mt. Gox, has continued to maintain his innocence...

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large reservoir of trusted IP addresses...

Leading the latest edition of the ISMG Security Report: Microsoft's Joram Borenstein highlights his top three areas of focus for 2019. Plus, Randy Vanderhoof of the US Payments Forum on securing...

Tool Hides Virtual Volumes But Leaves Linux Looking 'Bit-for-Bit' NormalDigital steganography is the practice of hiding information in plain sight, especially inside other data or images. And a...

read more

Chinese telecoms giant Huawei expects to see a 21 percent rise in revenue for 2018, its chairman said Thursday despite a year of "unfair treatment" which saw its products banned in several...