This week there have been several major malware injection campaigns against WordPress blogs and other php-based content management systems. This malware injection...
[Update: according to Neil Rubenking, FB chat is now working again and it's no longer possible to view friend requests or chat...
…but not in a good sense. Clearly there's a lot of confusion about the detail of Facebook's latest changes, as suggested by...
I recently received a summons for Jury duty. The date I was supposed to appear on coincides with a date I am...
As I previously blogged today, the hacker who broke into Sarah Palin’s Yahoo account was convicted on two charges. The way that...
it’s anyone’s guess whether 24’s Jack Bauer would win in a faceoff against the new FBI Cyber Crimes Top Cop, Gordon Snow....
Wow. File this under ‘how stupid thoughtless can any one person in a position of absolute power be…’ One school official abuses the built-in...
My assessment is that this could be a strong leap forward in support of Community Driven Open Source Privacy. Another assessment is...
Better get your CFO to review UCC Article 4A and realign protocols with your business bank – The clear and present danger...
In response to questions I heard this weekend from friends of mine about the ‘big picture’ relevance of the 1.5 million Facebook...
The Internet is abuzz with the announcement from Verisign’s iDefense Labs that a criminal hacker on a Russian forum who goes by...
Is online privacy with Facebook technologically agnostic or can different rules apply if you post with your iPhone or other Smartphone? Are...
Earlier this month, we reported on the massive new Koobface campaign making the rounds through Facebook and how it tricked users into...
From time to time I hear people who don’t use antivirus software claim that it doesn’t matter, there isn’t anything of value...
Last week Al Quaeda cyberterrorism attack information was declassified and made public. Today’s New York Times had an applicable editorial to whether...
I've just read a news item about a nine year old boy who has been accused of hacking into his school's computer...
The Boston Globe suggested that changing passwords is a waste of time, based on their interpretation of an article by Herley Cormac. Cormac's...
I find it hard to not be shocked at a headline like this… Then I remembered the recent top cybercrime city survey...
Mario Vuksan, Tomislav Pericin and Brian Karney have been talking...about vulnerabilities they've found in various compression formats ... as well as their...
Clearly, anything which is posted online should be assumed to be eternal, written in stone tablets, and admissible for all time. For...
Are Your SaaS Backups as Secure as Your Production Data?
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
How to implement Principle of Least Privilege(Cloud Security) in AWS, Azure, and GCP cloud
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions