
Facebook Cracks Down On Data Misuse With Expanded Bug Bounty Program
Facebook announced that in the coming weeks it will expand its bug bounty...

GoScanSSH Malware Targets SSH Servers, But Avoids Military and .GOV Systems
Researchers identify a new malware family called GoScanSSH that avoids servers linked to...

Mozilla Tests DNS over HTTPS: Meets Some Privacy Pushback
Mozilla is testing a method of securing DNS traffic via HTTPS, but is...

Zuckerberg Breaks Silence: ‘We Made Mistakes’ Regarding Cambridge Analytica Debacle
Facebook CEO Mark Zuckerberg broke his silence on the Cambridge Analytica scandal that...

Orbitz Warns 880,000 Payment Cards Suspected Stolen
Orbitz said Tuesday a breach of both its consumer and partner platform...

Telegram Ordered to Hand Over Encryption Keys to Russian Authorities
Popular secure messaging service Telegram loses battle with Russian courts and now must...

Programs Controlling ICS Robotics Are ‘Wide Open’ to Vulnerabilities
Dewan Chowdhury, founder of MalCrawler, talks at SAS about the risks that companies...

Facebook Data Privacy Policies Bashed By Critics After Cambridge Analytica Incident
Facebook is in hot water after acknowledging that a consulting group – that...

Denial of Service guidance
Denial of Service attacks are one of the modern cyber criminal's favourite tools,...

GandCrab Ransomware Crooks Take Agile Development Approach
Despite setbacks hackers behind GandCrab malware are pushing ahead with lucrative new ransomware...

New Web-Based Malware Distribution Channel ‘BlackTDS’ Surfaces
Researchers highlight a privately held traffic distribution system tool for malware called BlackTDS...

Table view of principles and related guidance
This page is intended as a handy summary of the 14 NIS principles and...

Microsoft Patches 15 Critical Bugs in March Patch Tuesday Update
Products receiving the most patches included Microsoft browsers and browser-related technologies such as...

TLS 1.3: better for individuals – harder for enterprises
The Secure Sockets Layer (SSL) protocol was first introduced in 1994 by Netscape....

NCSC IT: Installing software updates without breaking things
Software updates can be a controversial topic. We all know it’s important to...

Olympic Destroyer: A False Flag Confusion Bomb
Researchers say the case of Olympic Destroyer malware show how threat actors can...

Lookout: Dark Caracal Points To APT Actors Moving To Mobile Targets
Lookout researchers discussed Dark Caracal's implications for APT actors in the mobile space...

Fixing all the things
The Department for Digital, Culture, Media and Sport (DCMS) has just published the...

Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months
Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business...

In Wake of ‘Biggest-Ever’ DDoS Attack, Experts Say Brace For More
This week's DDoS attack against GitHub is a harbinger of attacks to come...

Bug in HP Remote Management Tool Leaves Servers Open to Attack
Firmware versions of HPE’s remote management hardware iLO3 have an unauthenticated remote denial...

Ad Network Circumvents Ad-Blocking Tools To Run In-Browser Cryptojacker Scripts
Researchers say cyrptojackers are bypassing ad-blocking software in an attempt to run in-browser...

We’re trying to cure cancer, why would anyone attack us?
You heard on the news this morning about another big cyber crime attack....

Massive Malspam Campaign Targets Unpatched Systems
Morphisec said that it has detected several malicious word documents – part of...

Apple Tackles Cellebrite Unlock Claims, Sort Of
In the wake of claims an Israeli company Cellebrite has developed an unlocking...

The Trouble with Phishing
Phishing has become one of the most talked about threats in cyber security and...

FBI Warns of Spike in W-2 Phishing Campaigns
A recent FBI public service advisory warned of an increase in reports of...

Cryptojacking Attack Found on Los Angeles Times Website
A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage...

Year-Old Coldroot RAT Targets MacOS, Still Evades Detection
Researchers are warning users about the Coldroot remote access Trojan that is going...

Not perfect, but better: improving security one step at a time
If you're anything like me, at every family and/or friends' get-together you'll inevitably...