Archive

Media giant Nikkei has become the latest firm to suffer a humiliating Business Email Compromise (BEC), after it admitted losing $29m to scammers following human error. The Tokyo-headquartered firm, which owns the Financial Times, revealed in a brief statement that

Palo Alto Networks discovered a new version of Gafgyt botnet composed of Home & Small Office Wireless routers used to attack gaming servers. Palo Alto Networks researchers discovered a new version of Gafgyt botnet targeting home & small office wireless

Experts have spotted the first mass-hacking campaign exploiting the BlueKeep exploit, crooks leverage the exploit to install a cryptocurrency miner. Security researchers have spotted the first mass-hacking campaign exploiting the BlueKeep exploit, the attack aims at installing a cryptocurrency miner

As if there aren’t already enough cybersecurity threats looming in our daily lives, there’s one garnering an increasing amount of attention–car hacking. Automotive cybersecurity is a term for the tools and techniques used to protect the electronic systems of a

A vulnerability affecting devices running Andoid 8 (Oreo) or later, tracked as CVE-2019-2114, could be exploited by hackers to infect them via NFC beaming. Google has recently released a patch to address a vulnerability affecting devices running Android 8 (Oreo)

This is an emergency notice for all Chrome users!!! Google released an emergency update for Chrome that patches two new use-after-free vulnerabilities which include a zero-day bug that is actively exploiting in wide. New stable channel update to Chrome 78.0.3904.87

Working environments designed to empower only men are putting women off pursuing cybersecurity careers. Cybersecurity professionals speaking at the (ISC)2 Security Congress held in Florida this week revealed that talented women are taking their skills elsewhere because cybersecurity made them

A structured transdisciplinary approach could be the key to successfully engaging children in cybersecurity. Participants in a STEAM education panel held at the ninth annual (ISC)2 Security Congress called for cybersecurity to be taught as an integral part of all

The recruiting methods being used in the cybersecurity industry are so dire that they pose a national security threat. In an exclusive interview with Infosecurity Magazine at the (ISC)2 Security Congress in Orlando, Florida, the founder and CEO of cybersecurity

Twitter has announced a ban on political advertising ahead of crucial elections in the UK and US over the coming year, turning up the heat on Facebook to tackle micro-targeting campaigns on social media. At Infosecurity Europe earlier this year,

Researchers discovered a new malware variant dubbed Gafgyt infect IoT devices specifically routers used in a small office and home network. The malware variant targets commercial routers like Zyxel, Huawei, and Realtek. It exploits remote execution code vulnerability in routers

The next generation of cybersecurity specialists must look at ways to ensure better security for our whole lifetime. Speaking at Bsides Belfast, Duo Security advisory CISO Wendy Nather looked at the concept of “how do we live securely from cradle

Supply chain attacks continue to be a reality for businesses, and are easier for adversaries. Speaking at Bsides Belfast 2019, Cisco Talos security researchers Edmund Brumaghin and Nick Biasini explained that supply chains begin with a raw material that goes

A new malware dubbed “Messagetap” designed to monitor and record SMS traffic of certain phone numbers, IMSI numbers, and based on keywords for subsequent theft. The new malware was developed by the Chinese APT41 hacker group to deploy in the

Today, it’s no secret that gathering informing and figuring out various math problems is best completed digitally. What’s less known is the fact that it is also the best way to pinpoint shoppers as well as their behavior. Indeed, enlisting

Cybersecurity’s leading lights were recognized at an award ceremony held yesterday in Orlando, Florida. The special event, which took place at the Walt Disney World Swan and Dolphin Resort on day three of the (ISC)2 Security Congress, was staged to