Security News
Recorded Future has published a series of analyses on North Korea's most senior leadership's use of the internet. As the last report of the series, it demonstrates how adaptable this leadership...
Cryptojacking Attacks Are Reshaping Today's Threat LandscapeCryptojacking - the hidden mining of virtual currencies - continues to be a focus for online attackers. As the detection of...
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.
No flight delays, miraculously* Bristol Airport deliberately yanked its flight screens offline for two days over the weekend in response to a cyberattack.…
Strong security controls will protect your organization, but they may also hinder or annoy users. Here's how to walk the line between security and user accessibility.
ID fraud drops to four-year low New figures reveal UK identity fraud dropped during the first six months of 2018 to reach a four-year low.…
Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used in tens of millions...
Trade secrets are trumping personal liberty DEF CON American police and the judiciary are increasingly relying on software to catch, prosecute and sentence criminal suspects, but the code is...
A security firm established a sophisticated honeypot masquerading as a power transmission substation for a major electricity provider. The purpose was to attract attackers and analyze how they...
Amazon's face recognition falsely identified 28 members of Congress as criminals. Perhaps AI isn't quite ready for business.