Top IT Security Bloggers

  • 3 Charged In Fatal Kansas ‘Swatting’ Attack

    Krebs on Security
    Federal prosecutors have charged three men with carrying out a deadly hoax known as "swatting," in which perpetrators call or message a target's local 911 operators claiming a fake hostage situation or a bomb threat in progress at the target's address -- with the expectation that local police may respond to the scene with deadly force. While only one of the three men is accused of making the phony call to police that got an innocent man shot and killed, investigators say the other two men's efforts to taunt and deceive one another ultimately helped point the gun.
  • 2 million stolen identities used to make fake net neutrality comments

    Sophos - Naked Security
    Most crucially, two of those identities were senators who are now demanding the FCC find out who's behind the bots and the identity theft.
  • Office 365 will automatically block Flash and Silverlight

    Sophos - Naked Security
    If you are one of the small number of Office 365 users who enjoyed embedding Flash, Shockwave or Silverlight content inside files, time is about to run out on your unusual pastime.
  • FBI admits to inflating number of crime-related devices it can’t crack

    Sophos - Naked Security
    Investigators can't get into 7,775 devices? Nah, the FBI admits: it's more like 1,200... or 2000... pending an audit, it's not really sure.
  • VPNFilter router malware – what to do? [VIDEO]

    Sophos - Naked Security
    Learn how to deal with the VPNFilter malware currently plaguing 500,000 home routers worldwide.
  • VPNFilter botnet has hacked 500,000 routers. Reboot and patch now!

    Graham Cluley
    At least half a million routers and storage devices in dozens of countries around the world have been infected by a sophisticated botnet, in preparation for an alleged planned cyber attack on Ukraine.
    Read more in my article on the Tripwire State of Security blog.
  • Malicious Edge and Chrome Extension Used to Deliver Backdoor

    TrendLabs - Malware Blog
    We noticed a series of testing submissions in VirusTotal that apparently came from the same group of malware developers in Moldova, at least based on the filenames and the submissions' source. It appears they are working on a new malware that — based on how they were coded — is most likely intended to spread through spam emails embedded with malicious attachments.
    The downloader malware's payload is what makes it notable. It delivers a version of the Revisit remote administration tool, which is used to hijack the infected system. More importantly, it also delivers a malicious extension that could serve as a backdoor, stealing information keyed in on browsers.
    The post Malicious Edge and Chrome Extension Used to Deliver Backdoor appeared first on .
  • Malicious Edge and Chrome Extension Used to Deliver Backdoor

    Trend Micro - Security Intelligence
    We noticed a series of testing submissions in VirusTotal that apparently came from the same group of malware developers in Moldova, at least based on the filenames and the submissions' source. It appears they are working on a new malware that — based on how they were coded — is most likely intended to spread through spam emails embedded with malicious attachments.
    The downloader malware's payload is what makes it notable. It delivers a version of the Revisit remote administration tool, which is used to hijack the infected system. More importantly, it also delivers a malicious extension that could serve as a backdoor, stealing information keyed in on browsers.
    The post Malicious Edge and Chrome Extension Used to Deliver Backdoor appeared first on .
  • Smashing Security #079: Mugshots, mobile mania, and back end gurus

    Graham Cluley
    A website which demands money if you want your mugshot removed, could “sharenting” lead to a rise in fraud and identity theft, and how could the FBI have overcounted encrypted phones so badly?
    All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Varmazis.
  • Securing 3D Printing

    Isaca
    3D printing is fast becoming a disruptive technology in production and manufacturing. It grew to be a $5.1‐billion‐dollar industry by 2015 with an average growth rate of about 30%, and 5.8 million 3D printers are expected to be shipped annually by 2019.As noted in the recently issued ISACA Tech Brief: 3D Printing, 3D printers enable the manufacturing of certain items more economically than standard manufacturing processes. These machines receive an electronic file as input with details of a p...

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release