03 Apr

How to Protect Yourself Against Tax Scams

Who else loves tax season besides accountants? Scammers.  It’s high time of year for online risks here in the U.S. with the onset of tax

Author rabih
03 Apr

School principal resigns after writing $100,000 check to Elon Musk impersonator

In Brief The principal of a Florida science and technology charter school has resigned after allegedly writing a $100,000 check to an Elon Musk impersonator

Author rabih
03 Apr

3CX decided supply chain attack indicator was a false positive after VirusTotal tests

The CEO of VoiP software provider 3CX said his team tested its products in response to recent alerts notifying it of a supply chain attack,

Author rabih
03 Apr

Vietnam threatens to cut off two million mobile subscribers

Almost two million mobile phone subscribers in Vietnam are at risk of having their services severed, thanks to a new government policy that seeks to

Author rabih
03 Apr

School principal resigns after paying $100,000 to Elon Musk impersonator

In Brief The principal of a Florida science and technology charter school has resigned after allegedly writing a $100,000 check to an Elon Musk impersonator

Author rabih
01 Apr

Ukrainian cops nab suspects accused of stealing $4.3m from victims across Europe

Ukrainian cops have arrested two suspects and detained 10 others for their alleged roles in a cybercrime gang that used phishing scams and phony online

Author rabih
31 Mar

NYPD blues: Cops ignored 93 percent of surveillance law rules

Back in July 2020, then New York City Mayor Bill de Blasio signed the Public Oversight of Surveillance Technology (POST) Act into law, which required

Author rabih
31 Mar

From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee

March is Women’s History Month and International Women’s Day, and at McAfee, we partnered with McAfee Women in Cyber Security (WISE) Community to organize opportunities

Author rabih
31 Mar

Psst! Infosec bigwigs: Wanna be head of security at HM Treasury for £50k?

Given the importance of the Treasury department’s function to Britain, Reg readers might expect the Head of Cyber Security vacancy currently being advertised would come

Author rabih
31 Mar

NHS Highland ‘reprimanded’ by data watchdog for BCC blunder with HIV patients

In a classic email snafu NHS Highland sent messages to 37 patients infected with HIV and inadvertently used carbon copy (CC) instead of Blind Carbon

Author rabih
31 Mar

World Backup Day: Avoiding a data disaster is a forever topic 

By failing to prepare you are preparing to fail. Make sure you’re able to bounce back if, or when, a data disaster strikes. “Backup refers

Author rabih
31 Mar

Pro-Russia cyber gang Winter Vivern puts US, Euro lawmakers in line of fire

A cyber spy gang supporting Russia is targeting US elected officials and their staffers, in addition to European lawmakers, using unpatched Zimbra Collaboration software in

Author rabih
31 Mar

Leaked IT contractor files detail Kremlin’s stockpile of cyber-weapons

An unidentified whistleblower has provided several media organizations with access to leaked documents from NTC Vulkan – a Moscow IT consultancy – that allegedly show

Author rabih
31 Mar

Azure blunder left Bing results editable, MS 365 accounts potentially exposed

An Azure Active Directory (AAD) misconfiguration by Microsoft in one of its own cloud-hosted applications could have allowed miscreants to subvert the IT giant’s Bing

Author rabih
30 Mar

The Rising Trend of OneNote Documents for Malware delivery

Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M  observed a new Malware campaign which used malicious OneNote documents to entice users to click on an embedded file

Author rabih
30 Mar

Azure flaw left Bing results editable and MS 365 accounts exposed

A misconfiguration in Microsoft’s Azure Active Directory (AAD) could have allowed miscreants to subvert Microsoft’s Bing search engine – even changing search results. User information

Author rabih
30 Mar

AlienFox malware caught in the cloud hen house

A fast-evolving toolkit that can be used to compromise email and web hosting services represents a disturbing evolution of attacks in the cloud, which for

Author rabih
30 Mar

Do you use comms software from 3CX? What to do next after biz hit in supply chain attack

Two security firms have found what they believe to be a supply chain attack on communications software maker 3CX – and the vendor’s boss is

Author rabih
Load moreLoadingAll items loaded