Security News > 2019 > September

Malware or computer virus can infect your computer in several different ways, but one of the most common methods of its delivery is through malicious file attachments over emails that execute the...

Sen. Rand Paul Seeking to Throw Out HIPAA Identifier RequirementProponents of the potential adoption of a national unique patient identifier had been hopeful that the Senate would follow the...

Network attacks more than doubled this past quarter versus the prior quarter, according to a new report from security provider WatchGuard.

Attackers Used Phony Job Website to Install Malware, Researchers SayA threat group has been targeting U.S. veterans through a spoofed website promising help for those looking for jobs, according...

Attacks conducted by a suspected Chinese threat actor on technology companies in Southeast Asia employ a version of the open-source PcShare backdoor, BlackBerry Cylance security researchers warn. read more

Make Sure You do Some Incident Pruning to Maintain Security Operations Efficiency and Focus read more

After someone dropped a zero-day exploit on Securelist this week, the platform rushed out a fix -- time to apply it.

Researchers: Malware Used in Attacks Against Kuwaiti Transportation, Shipping CompaniesA hacking group is using new backdoor tools in a campaign targeting shipping and transportation companies in...

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

In the old world, applications generally consisted of a web server, an app server and a database. Traffic went from router to switch to firewall. There was a network perimeter, which was our...