Security News > 2019

Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's...

As NCSC Head Ciaran Martin Steps Down, Other Countries are Emulating ModelWanted: A new chief executive to assume command of Britain's growing National Cyber Security Center, part of GCHQ. As...

From smartphone tracking to "climate change" malware, get up to date with everything we've written in the last week.

How do hospitals' efforts to bolster information security in the aftermath of data breaches potentially affect patient outcomes? Professor Eric Johnson of Vanderbilt University discusses research...

Technical Data Plus Emails Made It Possible to Link Cameras to PeopleSeattle-based smart home device maker Wyze says an error by a developer exposed a database to the internet over a three-week...

It’s almost 2020, which means teams are finalizing cyber budgets, strategies and goals. However, as you’re preparing for the new year, it’s important to keep an eye out for how the cybersecurity...

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

Today marks the 10th anniversary of KrebsOnSecurity.com! Over the past decade, the site has featured more than 1,800 stories focusing mainly on cybercrime, computer security and user privacy...

Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.