Threats and vulnerabilities
Keeping up with the latest threats and vulnerabilities is a battle for any security pro. Get up-to-date information on email threats, nation-state attacks, phishing techniques, ransomware and malware, DDoS attacks, APTs, application vulnerabilities, zero-day exploits, malicious insiders and more.
Top Stories
-
News
19 Dec 2024
BeyondTrust SaaS instances breached in cyberattack
BeyondTrust, a privileged access management vendor, patched two vulnerabilities this week after attackers compromised SaaS instances for a 'limited number' of customers. Continue Reading
By- Arielle Waldman, News Writer
-
Feature
19 Dec 2024
10 cybersecurity predictions for 2025
AI will still be a hot topic in 2025, but don't miss out on other trends, including initial access broker growth, the rise of vCISOs, tech rationalization and more. Continue Reading
By- Kyle Johnson, Technology Editor
-
Answer
22 Dec 2017
Brutal Kangaroo: How does it hop to air-gapped computers?
The CIA Vault 7 cache exposed the Brutal Kangaroo USB malware, which can be spread to computers without an internet connection. Learn how this is possible with expert Nick Lewis. Continue Reading
By -
Feature
21 Dec 2017
Get the best botnet protection with the right array of tools
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading
By- Mike Chapple, University of Notre Dame
-
News
15 Dec 2017
Triton framework used in industrial control attacks
Security researchers discovered new ICS attacks using the Triton framework that may have been nation-state-sponsored and intended to cause real-world damage. Continue Reading
By- Michael Heller, TechTarget
-
Answer
13 Dec 2017
How can a local file inclusion attack be stopped?
A botnet-based local file inclusion attack targeted IBM X-Force customers. Expert Judith Myerson explains how these attacks work and how enterprises can defend against them. Continue Reading
-
Answer
11 Dec 2017
How does port swapping work to bypass two-factor authentication?
With a port swapping attack, hackers can bypass two-factor authentication and control a victim's mobile device. Judith Myerson explains how the attacks work and how to stop them. Continue Reading
-
Answer
07 Dec 2017
BlueBorne vulnerabilities: Are your Bluetooth devices safe?
Armis Labs discovered a series of vulnerabilities that enables remote connection to Bluetooth devices. Learn more about the BlueBorne vulnerabilities with expert Matt Pascucci. Continue Reading
-
Answer
04 Dec 2017
PGP keys: Can accidental exposures be mitigated?
The accidental publication of an Adobe private key could have put the company in jeopardy. Matt Pascucci explains how it happened and how to better protect PGP keys. Continue Reading
-
News
01 Dec 2017
Yahoo data breach hacker pleads guilty to cybercrime charges
One of the Yahoo data breach hackers pleaded guilty to his involvement in the attack. Plus, the FBI failed to notify U.S. officials that they were targets of Fancy Bear, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Guide
01 Dec 2017
Cyberthreats, cyber vulnerabilities, and how to fight back
The key to countering cyberthreats today is to first understand your biggest vulnerabilities and then research the most effective countermeasures available to minimize them. Continue Reading
-
Answer
30 Nov 2017
How can Intel AMT be used to bypass the Windows firewall?
Software developed by the hacking group Platinum takes advantage of Intel AMT to bypass the built-in Windows firewall. Expert Michael Cobb explains how it works. Continue Reading
By -
News
28 Nov 2017
Scarab ransomware joins with Necurs botnet for faster spread
The Scarab ransomware received an upgrade, and researchers have seen it being spread via the Necurs botnet, meaning the malware can spread to millions in a handful of hours. Continue Reading
By- Michael Heller, TechTarget
-
News
22 Nov 2017
Uber breach affected 57 million users, covered up for a year
A 2016 Uber breach affecting data for 57 million users was covered up by the company, including a $100,000 payment to the attackers to keep the incident quiet. Continue Reading
By- Michael Heller, TechTarget
-
Answer
17 Nov 2017
Ransomware recovery methods: What does the NIST suggest?
Knowing what ransomware recovery methods are available is important as the threat continues to grow. Expert Judith Myerson outlines what the NIST recommends for enterprises. Continue Reading
-
News
16 Nov 2017
Kaspersky sheds more light on Equation Group malware detection
A lengthy Kaspersky report offers more insight into how the antivirus company discovered Equation Group malware and came to possess classified U.S. government data. Continue Reading
By- Rob Wright, Senior News Director
-
News
14 Nov 2017
AVGater abuses antivirus software for local system takeover
A new proof-of-concept exploit, called AVGater, has found a way to abuse antivirus quarantines to attack systems and gain full control. Continue Reading
By- Michael Heller, TechTarget
-
Tip
09 Nov 2017
Email security issues: How to root out and solve them
Effectively tackling email security issues requires infosec pros to address a broad range of areas, including cloud, endpoints, user training and more. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
08 Nov 2017
WireX botnet: How did it use infected Android apps?
To avoid a mobile device catastrophe, several large tech organizations came together to stop the WireX botnet. Learn how this Android botnet with 300 infected apps was stopped. Continue Reading
-
Blog Post
31 Oct 2017
The Equation Group malware mystery: Kaspersky offers an explanation
Kaspersky Lab finally explained how it came to possess Equation Group malware, but does the company's latest statement answer enough questions about the ongoing drama? Continue Reading
By- Rob Wright, Senior News Director
-
Feature
31 Oct 2017
The Basics of Cyber Safety
In this excerpt from chapter four of The Basics of Cyber Safety, authors John Sammons and Michael Cross discuss basic email security. Continue Reading
By- Syngress and SearchSecurity
-
News
30 Oct 2017
Bad Rabbit ransomware data recovery may be possible
Security researchers found a way to recover data locked by the Bad Rabbit ransomware without paying, and others said money might not have been the driver of the attacks. Continue Reading
By- Michael Heller, TechTarget
-
News
27 Oct 2017
DUHK attack puts random number generators at risk
News roundup: Researchers find DUHK attacks can get around encrypted communications. Plus, FBI Director Wray criticizes mobile device encryption, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Answer
27 Oct 2017
EternalRocks malware: What exploits are in it?
When NSA cyberweapons went public, attackers bundled them into the EternalRocks malware. Nick Lewis takes a closer look at this new threat and explains what's lurking inside. Continue Reading
By -
News
26 Oct 2017
Bad Rabbit ransomware attacks planned long ago
The new Bad Rabbit ransomware spread through Russia and Ukraine, drawing comparisons to NotPetya, and researchers say the attacks were planned for a long time. Continue Reading
By- Michael Heller, TechTarget
-
News
24 Oct 2017
DHS' Dragonfly ICS campaign alert isn't enough, experts say
The Department of Homeland Security released an alert confirming the Dragonfly ICS cyberattack campaign, but experts said more action is needed to protect critical infrastructure. Continue Reading
By- Michael Heller, TechTarget
-
Answer
23 Oct 2017
HP keylogger: How did it get there and how can it be removed?
A keylogging flaw found its way into dozens of Hewlett Packard laptops. Nick Lewis explains how the HP keylogger works and what can be done about it. Continue Reading
By -
Blog Post
20 Oct 2017
Latest Kaspersky controversy brings new questions, few answers
The Kaspersky controversy continued this week as the antivirus company responded to several explosive news stories about its relationship with the Russian government. Continue Reading
By- Rob Wright, Senior News Director
-
Podcast
17 Oct 2017
Risk & Repeat: Kaspersky antivirus scans implicated in NSA breach
In this week's Risk & Repeat podcast, SearchSecurity editors discuss reports implicating Kaspersky antivirus scans in the recently disclosed breach at the National Security Agency. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
16 Oct 2017
How does Google Play Protect aim to improve Android security?
Google's new security platform, Google Play Protect, looks to decrease Android app security threats through machine learning. Michael Cobb explains how the new platform works. Continue Reading
By -
Answer
10 Oct 2017
How are Windows shortcut files vulnerable to attacks?
A Windows vulnerability targets shortcut files and enables hackers to automatically execute code. Expert Judith Myerson explains the flaw and how to stop it. Continue Reading
-
Answer
06 Oct 2017
How does the Ursnif Trojan variant exploit mouse movements?
A new version of the Ursnif Trojan uses mouse movements to bypass security efforts by beating sandbox detection. Expert Matthew Pascucci explains how this technique works. Continue Reading
-
News
29 Sep 2017
Proof-of-concept iOS exploit released by Google's Project Zero
Google's Project Zero released a proof-of-concept iOS exploit similar to the Broadpwn Wi-Fi flaw that could allow an attacker to run code or implant a backdoor. Continue Reading
By- Michael Heller, TechTarget
-
Answer
29 Sep 2017
New WordPress malware: What to do about WP-Base-SEO
A new type of WordPress malware, WP-Base-SEO, disguises itself as an SEO plug-in that opens backdoors. Nick Lewis explains how it works and how to avoid it. Continue Reading
By -
News
27 Sep 2017
Ransomware attackers using more sophisticated techniques
At the (ISC)2 Security Congress, infosec professionals warned of sophisticated ransomware attackers that are using more advanced techniques to encrypt entire networks. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
27 Sep 2017
PINLogger: How does this exploit steal PINs?
The proof-of-concept PINLogger attack exploits mobile device sensors to steal PINs. Nick Lewis explains how the attack works and offers advice on how to stop it. Continue Reading
By -
Answer
26 Sep 2017
Hajime IoT worm: Is it pure malware or vigilante malware?
The Hajime IoT worm aims to help users tighten up security, whether they want to or not, but it's probably not a good security strategy. Expert Nick Lewis explains the risks. Continue Reading
By -
Blog Post
22 Sep 2017
DerbyCon cybersecurity conference is unique and troubling
Walking up to DerbyCon 7.0 cybersecurity conference it immediately has a very different feel from the "major" infosec conferences. Attendees would never be caught loitering outside of the Black Hat ... Continue Reading
By- Michael Heller, TechTarget
-
News
22 Sep 2017
Users plagued by iOS app security issues, according to new research
News roundup: Researchers uncovered a large number of iOS app security risks. Plus, Viacom exposed its critical data through a misconfigured AWS S3 bucket, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
21 Sep 2017
Undocumented Word feature could lead to system information theft
An undocumented Word feature found by Kaspersky Lab could lead to system information theft and affects users on both PCs and mobile devices. Continue Reading
By- Michael Heller, TechTarget
-
Answer
21 Sep 2017
How does BrickerBot threaten enterprise IoT devices?
BrickerBot is similar to other IoT malware like Mirai, Hajime and others. Expert Judith Myerson explains what makes BrickerBot different, and what can be done to defend against it. Continue Reading
-
News
19 Sep 2017
CCleaner malware spread via supply chain attack
CCleaner malware was spread to users via an infected software update for close to one month, highlighting the dangers of supply chain attacks and the need for code signing. Continue Reading
By- Michael Heller, TechTarget
-
News
14 Sep 2017
BlueBorne Bluetooth vulnerabilities affect billions of devices
A set of eight Bluetooth vulnerabilities, branded together as BlueBorne, affect billions of devices and could be one of the most dangerous issues, according to experts. Continue Reading
By- Michael Heller, TechTarget
-
Answer
13 Sep 2017
How can memory corruption attacks threaten smartphones?
Smartphone users could be at risk of memory corruption attacks because of a baseband vulnerability. Expert Michael Cobb explains the attack and how concerned users should be. Continue Reading
By -
Answer
12 Sep 2017
How do code-reuse attacks bypass Windows 10 security features?
Certain Windows 10 security features can be bypassed with code-reuse attacks. Expert Michael Cobb explains how that works and what can be done to prevent it. Continue Reading
By -
Answer
11 Sep 2017
How is Pegasus malware different on Android than on iOS?
Pegasus malware used to only target iOS devices, but a variant called Chrysaor now goes after Android devices, too. Expert Michael Cobb explains what users need to know about it. Continue Reading
By -
News
08 Sep 2017
Six new vulnerabilities in Android bootloaders uncovered
News roundup: Researchers used the new BootStomp tool to uncover six vulnerabilities in Android bootloaders. Plus, a new wave of AWS S3 bucket data leaks strikes and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
07 Sep 2017
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers claim to be tracking a threat group called Dragonfly 2.0 hacker group that has been attacking critical infrastructure and setting up persistent infections on ICS networks. Continue Reading
By- Michael Heller, TechTarget
-
Feature
01 Sep 2017
Why WannaCry and other computer worms may inherit the earth
A vast majority of APT attacks and malware delivery happens via spear phishing. But worms have always had a place in the toolkit when the delivery method fit the mission. Continue Reading
By -
E-Zine
01 Sep 2017
Interception threatens TLS security; now what?
As global cyberattacks have exploded in recent months, the speed of infection is causing damage, not only to targeted industries and nation states, but to corporate valuations. In June, FedEx warned that the Petya cyberattack, which disrupted operations at its TNT Express subsidiary, may have "material impact" on the company's 2017 financial performance. Merck & Co. Inc., another victim of the cyberattack, issued a similar warning. A Trojan that morphed into a worm, Petya -- sometimes called NotPetya -- brought increased attention to the lack of security fundamentals practiced at major companies.
The majority of these threats enter networks through malware delivered via the internet. However, as the growth of HTTPS deployment continues, some companies are increasingly using Transport Layer Security (TLS) interception by middleboxes to maintain visibility into TLS security and malicious software. Researchers from top universities and technology companies, including Google, Mozilla and Cloudflare, published an HTTPS interception study in April that offered startling statistics on TLS security.
In this issue of Information Security magazine, we look at how worms play a role in advanced persistent threats and the ongoing issues related to HTTPS inspection and TLS security.
Continue Reading -
News
31 Aug 2017
Spambot email leak compromises 711M records
An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts. Continue Reading
By- Michael Heller, TechTarget
-
Tip
31 Aug 2017
How NotPetya ransomware used legitimate tools to move laterally
WannaCry and NotPetya ransomware woke enterprises up to an expanded threat landscape. Expert Michael Cobb explains these threats and what enterprises can do to stop them. Continue Reading
By - 28 Aug 2017
-
Answer
24 Aug 2017
ATMitch malware: Can fileless ATM malware be stopped?
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it spreads. Continue Reading
By -
Answer
23 Aug 2017
DoubleAgent malware could turn antivirus tools into attack vector
DoubleAgent malware is a proof of concept for a zero-day vulnerability that can turn antivirus tools into attack vectors. Expert Nick Lewis explains how to contain the threat. Continue Reading
By -
Podcast
23 Aug 2017
Risk & Repeat: Was the DNC hack an inside job?
In this week's Risk & Repeat podcast, SearchSecurity editors examine claims from intelligence veterans that the DNC hack was an inside job, and not the work of Russian hackers. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
22 Aug 2017
Destruction of service: How ransomware attacks have changed
New ransomware variants have introduced another threat to enterprises. Rob Shapland explains what destruction of service attacks are and how organizations should prepare for them. Continue Reading
By -
Answer
21 Aug 2017
How does the MajikPOS malware evade detection?
A new POS malware downloads a RAM scraper to avoid detection. Expert Nick Lewis explains the tricks MajikPOS uses to target retail terminals and how to defend against it. Continue Reading
By -
Answer
17 Aug 2017
How does CrashOverride malware threaten industrial control systems?
CrashOverride malware targets industrial control systems and can wreak havoc. Expert Judith Myerson explains the capabilities of the malware and what to do to stop it. Continue Reading
-
Podcast
16 Aug 2017
Risk & Repeat: MalwareTech indictment raises questions
In this week's Risk & Repeat podcast, SearchSecurity editors explore the FBI's case against security researcher Marcus Hutchins, better known as MalwareTech. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
14 Aug 2017
How can VMware vulnerabilities in vSphere expose credentials?
Two VMware vulnerabilities in vSphere Data Protection were recently patched. Expert Judith Myerson explains how the flaws work and how to defend against them. Continue Reading
-
Answer
10 Aug 2017
Libpurple flaw: How does it affect connected IM clients?
The libpurple library contains a code execution vulnerability that affects the IM clients that were developed using it. Expert Michael Cobb explains how the flaw works. Continue Reading
By -
News
04 Aug 2017
Ransomware recovery goes beyond data loss for enterprises
Enterprises may see paying up as a quick path to ransomware recovery, but experts said there are many issues to consider when making that choice. Continue Reading
By- Michael Heller, TechTarget
-
Podcast
02 Aug 2017
Risk & Repeat: Black Hat 2017 highlights
In this week's Risk & Repeat podcast, SearchSecurity editors recap Black Hat 2017 and discuss some of the big news from the event, including the Broadpwn remote exploit. Continue Reading
By- Rob Wright, Senior News Director
-
News
28 Jul 2017
Who are the Shadow Brokers? Signs point to an intelligence insider
At Black Hat 2017, security researcher Matt Suiche analyzed the Shadow Brokers dumps, postings and behavior to get to the bottom of one of the infosec industry's biggest questions. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
28 Jul 2017
Poison Ivy RAT: What new delivery techniques are attackers using?
A revamped Poison Ivy RAT campaign has been using new evasion and distribution techniques. Expert Nick Lewis explains the new attack methods that enterprises should look out for. Continue Reading
By -
News
27 Jul 2017
Phishing research shows troubling trends for enterprise users
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats. Continue Reading
By- Rob Wright, Senior News Director
-
News
27 Jul 2017
Industroyer malware a turning point for ICS security
Security researchers at Black Hat 2017 analyzed the Industroyer malware, the attack on Ukraine's power grid and what it means for industrial control system security in the U.S. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
27 Jul 2017
What tools were used to hide fileless malware in server memory?
Fileless malware hidden in server memory led to attacks on many companies worldwide. Expert Nick Lewis explains how these attacks fit in with the wider fileless malware trend. Continue Reading
By -
News
26 Jul 2017
At Black Hat 2017, an industry hits a milestone and finds new directions
Long a conference that has thrived on technical sophistication and nuanced attacks, Black Hat USA 2017 in Las Vegas also found room for softer themes. Continue Reading
-
Feature
25 Jul 2017
Advanced Persistent Security
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading
By- Syngress and SearchSecurity
-
Answer
21 Jul 2017
How do the malware implants RedLeaves and PlugX work?
Malware implants RedLeaves and PlugX infected networked systems in multiple industries and leveraged stolen administrator credentials. Expert Judith Myerson explains how it works. Continue Reading
-
Answer
20 Jul 2017
How can users protect themselves from the DocuSign phishing email?
A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to avoid this type of attack. Continue Reading
-
News
13 Jul 2017
Petya malware behavior may change based on AV installed
Researchers found changes in malware behavior when Petya detected certain security products, but experts are unsure why these features might exist. Continue Reading
By- Michael Heller, TechTarget
-
News
07 Jul 2017
Tax software backdoor allowed NotPetya ransomware attacks
Researchers analyze the software backdoor used to deliver NotPetya ransomware to Ukraine targets, while the threat actors behind the attacks ask for more money. Continue Reading
By- Michael Heller, TechTarget
-
Tip
06 Jul 2017
How WannaCry malware affects enterprises' ICS networks
WannaCry malware has been plaguing organizations across the world. Expert Ernie Hayden explains how this ransomware threatens ICS networks and their security. Continue Reading
By- Ernie Hayden, 443 Consulting LLC
-
Podcast
05 Jul 2017
Risk & Repeat: NotPetya ransomware raises the stakes
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the NotPetya ransomware, its impact and the growing trend of sophisticated ransomware attacks. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
03 Jul 2017
How does the Antbleed backdoor vulnerability work?
Antbleed, a backdoor vulnerability, was discovered in bitcoin mining equipment. Expert Matthew Pascucci explains how the Bitmain flaw works and how it can be prevented. Continue Reading
-
News
30 Jun 2017
The ELSA project enables hackers to track and store geolocation data
News roundup: The ELSA project -- one of the released CIA hacking tools -- can track device locations. Plus, Senators move to ban Kaspersky Lab products from the military, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
30 Jun 2017
NotPetya ransomware trend moving toward sophistication
NotPetya represented advanced malware compared to its cousin WannaCry, but also showed sophistication that experts worry may be a ransomware trend. Continue Reading
By- Michael Heller, TechTarget
-
News
28 Jun 2017
Petya ransomware scam: Lost files can't be restored
Researchers discovered the rash of Petya-like attacks are nothing more than a ransomware scam, and list files are impossible to restore. Continue Reading
By- Michael Heller, TechTarget
-
News
28 Jun 2017
Petya-like global ransomware attack can be mitigated
A new global ransomware attack has been spreading quickly using the same exploits as WannaCry, but researchers have already found ways to protect users from the damage. Continue Reading
By- Michael Heller, TechTarget
-
Answer
23 Jun 2017
Fruitfly Mac malware: How does its decades-old code work?
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis explains how it works. Continue Reading
By -
Answer
21 Jun 2017
What are HummingWhale malware's new ad fraud features?
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the malware's new features. Continue Reading
By -
News
20 Jun 2017
Valerie Plame warns of increased nation-state cyberattacks
At the 2017 Cloud Identity Summit, former covert CIA officer Valerie Plame discussed the increasing risks of nation-state cyberattacks focused on geopolitical influence. Continue Reading
By- Rob Wright, Senior News Director
-
Podcast
14 Jun 2017
Risk & Repeat: Comey warns of more election hacking
In this week's Risk & Repeat podcast, SearchSecurity editors discuss former FBI Director James Comey's testimony on election hacking and election interference from Russia. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
13 Jun 2017
How can Bosch's diagnostic dongle be leveraged by hackers?
Hacks on a car's diagnostic dongle can completely take over the vehicle and even shut off the engine. Expert Judith Myerson explains how this works and how to prevent it from happening. Continue Reading
-
News
13 Jun 2017
CrashOverride ICS attack targets vulnerable electrical grid
Researchers discovered new details of a Kiev ICS attack from December using CrashOverride malware that could be used to disrupt an insecure electrical grid. Continue Reading
By- Michael Heller, TechTarget
-
News
12 Jun 2017
Q&A: Cyber attribution matters, RSA GM Peter Tran says
RSA's GM Peter Tran sheds light on the value of cyber attribution, explains why the 'how' and 'why' of an attack may be more important than finding who did it. Continue Reading
By- Michael Heller, TechTarget
-
Answer
12 Jun 2017
How do attackers use Microsoft Application Verifier for hijacking?
Attackers found a way to use Microsoft Application Verifier to hijack security products, like antivirus tools. Expert Judith Myerson explains how it's done and what to do to stop it. Continue Reading
-
Podcast
08 Jun 2017
Risk & Repeat: Shadow Brokers launch zero-day exploit service
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Shadow Brokers' monthly service for zero-day exploits and how it may affect enterprise security efforts. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
08 Jun 2017
Embedded malware: How OLE objects can harbor threats
Nation-states have been carrying out attacks using RTF files with embedded malware. Expert Nick Lewis explains how OLE technology is used and how to protect your enterprise. Continue Reading
By -
Answer
08 Jun 2017
The Apple Notify flaw: How does it allow malicious script injection?
Flaws in the Apple Notify function and iTunes can enable attackers to inject malicious script into the application side. Expert Michael Cobb explains how these vulnerabilities work. Continue Reading
By -
News
07 Jun 2017
Election cyberattack proves people are still the biggest flaw
A new NSA leak allegedly shows Russian agents engaged in election cyberattacks against local U.S. governments and proves people are still the hardest cybersecurity risk to mitigate. Continue Reading
By- Michael Heller, TechTarget
-
News
31 May 2017
Shadow Brokers dump crowdfunding raises ethical questions
The prospect of monthly NSA cyberweapons leaks in new Shadow Brokers dump raises questions about the ethics of paying criminals for stolen goods. Continue Reading
By- Michael Heller, TechTarget
-
News
26 May 2017
Voting machine hacking to be taken on at DEFCON 2017
Possible voting machine hacking has been a topic of conversation since before the 2016 election and at DEFCON 2017; professional pentesters will find out what damage can be done. Continue Reading
By- Michael Heller, TechTarget
-
Answer
26 May 2017
How can customer service staff spot social engineering email attacks?
Social engineering emails targeted at customer service staff have led to the spread of the August malware. Expert Nick Lewis explains how to identify and mitigate these attacks. Continue Reading
By -
Answer
25 May 2017
How does Gooligan malware compromise Google accounts?
Android apps infected with Gooligan malware enable attackers to compromise the security of Google accounts. Expert Nick Lewis explains how users can protect themselves. Continue Reading
By -
News
24 May 2017
Seven NSA cyberweapons used in EternalRocks exploit
Following the worldwide impact of WannaCry, EternalRocks arrived abusing seven NSA cyberweapons but holding back on its malicious intent. Continue Reading
By- Michael Heller, TechTarget
-
News
24 May 2017
WannaCry ransomware decryptor brings hope to victims
Security researchers uncovered more info on how WannaCry spread, and a ransomware decryptor emerged to save files for those affected. Continue Reading
By- Michael Heller, TechTarget
-
Answer
22 May 2017
Switcher Android Trojan: How does it attack wireless routers?
The Switcher Trojan spreads to Android devices through the wireless router to which they are connected. Expert Nick Lewis explains how this attack is carried out. Continue Reading
By -
Answer
18 May 2017
What is the SS7 protocol and what are its security implications?
The SS7 protocol has been a source of controversy lately because of its security vulnerabilities. Expert Judith Myerson explains what the protocol is and what its issues are. Continue Reading