01 Oct

Sure, you can do Kubernetes at scale. But can you do it securely too?

Sponsored Doing cloud native at enterprise scale is no mean feat, but doing it securely is the real challenge. So, who do you turn to

Author rabih
01 Oct

That ‘anti-NSO Pegasus spyware’ download is actually a Trojan – so don’t touch it

A malware peddler has created a fake website posing as Amnesty International to serve gullible marks with software that claims to protect users against NSO

Author rabih
01 Oct

IKEA: Cameras were hidden in the ceiling above warehouse toilets for ‘health and safety’

IKEA has removed hidden security cameras from its warehouse in Peterborough, England, after an employee spotted one in the ceiling void while using the toilet.

Author rabih
01 Oct

October is Cybersecurity Awareness Month! Why being cyber‑smart matters

The campaign may last for a month, but we should remember that cybersecurity is a year-round affair The month of October is associated with a

Author rabih
01 Oct

2FA? More like 2F-in-the-way: It seems no one wants me to pay for their services after all

Something for the Weekend, Sir? “Buy me a beer?” Sure, I buy beers for perfect strangers all the time. But you will have to wait

Author rabih
30 Sep

Revealed: How to steal money from victims’ contactless Apple Pay wallets

Apple’s digital wallet Apple Pay will pay whatever amount is demanded of it, without authorization, if configured for transit mode with a Visa card, and

Author rabih
30 Sep

Ransomware crim: Yeah, what I do is bad. No, I don’t care. Yes, infosec bods are all mouth and no trousers

Someone claiming to be a former contractor for the REvil ransomware gang has given an interview to a security firm, saying he struggles to sleep

Author rabih
30 Sep

Hackers could force locked iPhones to make contactless payments

Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds Cybercriminals could make fraudulent purchases

Author rabih
30 Sep

Which? survey finds people would actually pay the online giants not to take their data

Consumer guardian Which? has attempted to put a price on people’s personal information as it ramps up pressure for tougher rules around data-ravenous tech giants

Author rabih
30 Sep

UK MoD data strategy calls for social media surveillance on behalf of ‘local authorities’

The Ministry of Defence has published a data strategy that calls on the British armed forces to make better use of its “enduring strategic asset”

Author rabih
30 Sep

Attacks against Remote Desktop Protocol endpoints have exploded this year, warns ESET’s latest Threat Report

Security specialist ESET’s latest Threat Report warns of a massive increase in attacks on Remote Desktop Protocol (RDP) endpoints – and new activity from the

Author rabih
30 Sep

Anonymous: We’ve leaked disk images stolen from far-right-friendly web host Epik

Entities using the name and iconography of Anonymous (EUTNAIOA) claim to have leaked server disk images extracted from Epik – the controversial US outfit that

Author rabih
29 Sep

Don’t look a GriftHorse in the mouth: Trojan trampled 10 million Android devices

You may be advised not to look a gift horse in the mouth, lest you appear ungrateful for questioning its health. But you probably want

Author rabih
29 Sep

Unpatched flaw ‘weaponises’ Apple AirTags to turn them into the phisherman’s friend

Apple has been accused of ignoring a vulnerability in the Lost Mode functionality of its AirTags location-tracking accessories which would allow an attacker to seed

Author rabih
29 Sep

Akamai beefs up cybersecurity portfolio with ransomware-tastic Guardicore acquisition

Content delivery network Akamai is set to crack open the piggy bank with the purchase of Israel-based Guardicore. The deal, worth $600m, is intended to

Author rabih
29 Sep

The Art of Ruthless Prioritization and Why it Matters for SecOps

The security operations center (SecOps) team sits on the front lines of a cybersecurity battlefield. The SecOps team works around the clock with precious and

Author rabih
29 Sep

CISA and NSA release guidance for securing VPNs

What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks The NSA and CISA have released joint

Author rabih
29 Sep

Kaspersky links new Tomiris malware to Nobelium group

Security outfit Kaspersky has presented research on what appears to be the second new tool of the Nobelium advanced persistent threat group outed so far

Author rabih
Load moreLoadingAll items loaded