03 Aug

Microsoft widens enterprise access to its threat intelligence pool

Microsoft says it will give enterprise security operation centers (SOCs) broader access to the massive amount of threat intelligence it collects every day. Through two

Author rabih
03 Aug

Ex-T-Mobile US store owner phished staff, raked in $25m from unlocking phones

A now-former T-Mobile US store stole at least 50 employees’ work credentials to run a phone unlocking and unblocking service that prosecutors said netted $25

Author rabih
03 Aug

Sonatype shines light on typosquatting ransomware threat in PyPI

Miscreants making use of typosquatting are being spotted by researchers at Sonatype, emphasizing the need to check that the package is really the one you

Author rabih
03 Aug

You can’t choose when you’ll be hit by ransomware, but you can choose how you prepare

Sponosred Feature What sort of disaster would you rather prepare for? Hurricanes are destructive, but you know when one’s coming, giving you time to take

Author rabih
03 Aug

NortonLifeLock and Avast $8.6b deal gets provisional yes from UK regulator

The UK’s Competition and Markets Authority has given a provisional nod to the proposed merger of British cybersecurity company Avast and US rival NortonLifeLock. Action

Author rabih
03 Aug

Post-quantum crypto cracked in an hour with one core of an ancient Xeon

One of the four encryption algorithms the US National Institute of Standards and Technology (NIST) recommended as likely to resist decryption by quantum computers has

Author rabih
03 Aug

Nancy Pelosi ties Chinese cyber-attacks to need for Taiwan visit

Speaker of the US House of Representatives Nancy Pelosi has tied her controversial visit to Taiwan to an alleged barrage of China-directed cyber-attacks against the

Author rabih
03 Aug

5 Steps to Removing Your Personal Information From the Internet

A recent report by Javelin Strategy and Research found that identity theft cost Americans $56 billion in 2020, with imposter scams accounting for 20% of

Author rabih
03 Aug

VMware patches critical ‘make me admin’ auth bypass bug, plus nine other flaws

VMware has fixed a critical authentication bypass vulnerability that hits 9.8 out of 10 on the CVSS severity scale and is present in multiple products.

Author rabih
03 Aug

How to Stay One Step Ahead of Hackers

Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a

Author rabih
03 Aug

How to Delete Old Accounts Containing Personal Information

Your digital footprint grows with every internet account you make. While your old Tumblr account may be fun for reminiscing, dormant accounts are actually one

Author rabih
03 Aug

What Personal Data Do Companies Track?

Private tech companies gather tremendous amounts of user data. These companies can afford to let you use social media platforms free of charge because it’s

Author rabih
02 Aug

How a crypto bridge bug led to a $200m ‘decentralized crowd looting’

Cryptocurrency bridge service Nomad, which describes itself as “an optimistic interoperability protocol that enables secure cross-chain communication,” has been drained of tokens notionally worth $190.7

Author rabih
02 Aug

Technical Support Scams – What to look out for

Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make victims believe they have issues

Author rabih
02 Aug

Robinhood’s crypto unit hit with $30m fine over security, anti-crime misses

Robinhood’s cryptocurrency operations has been fined $30 million for violating New York’s anti-money-laundering and cybersecurity regulations. According to the US state’s Department of Financial Services,

Author rabih
02 Aug

How cybercrims embrace messaging apps to spread malware, communicate

Cybercriminals are turning to messaging apps like Telegram and Discord as alternatives to popular underground forums: not only for the private communications and security features

Author rabih
02 Aug

Threat groups embrace messaging apps to spread malware, communicate

Cybercriminals are turning to messaging apps like Telegram and Discord as alternatives to popular underground forums: not only for the private communications and security features

Author rabih
02 Aug

Bot army risk as 3,000+ apps found spilling Twitter API keys

Want to build your own army? Engineers at CloudSEK have published a report on how to do just that in terms of bots and Twitter,

Author rabih
Load moreLoadingAll items loaded