it’s anyone’s guess whether 24’s Jack Bauer would win in a faceoff against the new FBI Cyber Crimes Top Cop, Gordon Snow....
Wow. File this under ‘how stupid thoughtless can any one person in a position of absolute power be…’ One school official abuses the built-in...
My assessment is that this could be a strong leap forward in support of Community Driven Open Source Privacy. Another assessment is...
Better get your CFO to review UCC Article 4A and realign protocols with your business bank – The clear and present danger...
In response to questions I heard this weekend from friends of mine about the ‘big picture’ relevance of the 1.5 million Facebook...
The Internet is abuzz with the announcement from Verisign’s iDefense Labs that a criminal hacker on a Russian forum who goes by...
Is online privacy with Facebook technologically agnostic or can different rules apply if you post with your iPhone or other Smartphone? Are...
Earlier this month, we reported on the massive new Koobface campaign making the rounds through Facebook and how it tricked users into...
From time to time I hear people who don’t use antivirus software claim that it doesn’t matter, there isn’t anything of value...
Last week Al Quaeda cyberterrorism attack information was declassified and made public. Today’s New York Times had an applicable editorial to whether...
I've just read a news item about a nine year old boy who has been accused of hacking into his school's computer...
The Boston Globe suggested that changing passwords is a waste of time, based on their interpretation of an article by Herley Cormac. Cormac's...
I find it hard to not be shocked at a headline like this… Then I remembered the recent top cybercrime city survey...
Mario Vuksan, Tomislav Pericin and Brian Karney have been talking...about vulnerabilities they've found in various compression formats ... as well as their...
Clearly, anything which is posted online should be assumed to be eternal, written in stone tablets, and admissible for all time. For...
According to FBI Cyber Division Director Chabinsky’s keynote speech last week the supporting elements of a somewhat clannish and tribal entity such...
After posting the article regarding this new legislature I continued my research into the objections which have been raised by many cyber...
Insider Threat – your ATM may now be hacked from the inside. According to Wired’s Threat Level Blog… A Bank of...
According to the CBO report quoted in this graphic, three dollars from every citizen of the United States each year for four...
Interesting news this week with some heavy anticrime work in Russia resulting in the arrests of the alleged RBS Worldbank cybercriminals. In...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment