Security News > 2019

Lowjax city: Researchers crack open notorious Fancy Bear rootkit
2019-01-16 18:04

UEFI malware has been in the wild for more than two years The Fancy Bear hacking group's Lojax rootkit is far from a one-off tool, and may have been active in the wild for years before it was...

Vulnerability Allowed Fortnite Account Takeover Without Credentials
2019-01-16 17:25

Hacking game accounts is a popular -- and enriching -- pastime. The rise of in-game marketplaces that can be used for buying and selling game commodities has attracted hackers who break into...

To stay competitive, MSSPs need to grow and evolve
2019-01-16 16:51

​Managed Security Service Providers can alleviate many of the headaches suffered by in-house security, but they need to remain nimble and focused to retain their edge.

More .gov Domains Hit by Government Shutdown
2019-01-16 16:50

The number of US government domains for which TLS certificates were left to expire due to the government shutdown has now exceeded 130, UK-based cybersecurity solutions provider Netcraft reported...

U.S. Issues Multiple Charges For 2016 SEC Hack
2019-01-16 16:47

The two were able to hack into the SEC's computer systems due to phishing attacks that stole credentials and spread malware.

Fortnite Hacked Via Insecure Single Sign-On
2019-01-16 16:16

Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts.

Quantum Computing: Sizing Up the Risks to Security
2019-01-16 16:03

Within the next five to 10 years, quantum computing will get so powerful that it could be used to break encryption on the fly, predicts Steve Marshall, CISO at U.K.-based Bytes Software Services.

WordPress to Warn on Outdated PHP Versions
2019-01-16 15:41

In an effort to improve the security of websites, WordPress will display a warning starting in April 2019 when encountering outdated PHP versions. In December last year, the free and open-source...

Avoiding Critical Security Risk Analysis Mistakes
2019-01-16 15:33

Privacy attorney Adam Greene provides tips for avoiding mistakes when conducting a HIPAA security risk analysis and spells out the essential steps to take.