Hackers claim to have unearthed a zero-day vulnerability giving attackers admin rights to any Windows machine from Windows 2000 to a fully patched version of Windows 10.
Browsing Author: Tom Spring
Crooks breaking into enterprise networks are holding data they steal for ransom under the guise they are doing the company a favor exposing a flaw.
Businesses were hit hardest by inbox-based scams in 2015 that robbed U.S. companies of $263 million.
Microsoft says enterprises need to ban common passwords and rethink outdated ideas about what makes a strong password.
Researchers tracked a Locky ransomware and spam attack that spoofed an Amazon shipping email that included an estimated 100 million sent missives.
Wekby attackers are turning to the technique known as DNS tunneling in lieu of more conventional HTTP delivery of command and controls for remote access control of infected computer networks.
Google wants to kill passwords with Project Abacus, which Google said will become available on Android devices by the end of 2016.
Expert Troy Hunt waxes on last week’s LinkedIn data dump of 117 million credentials and how it reflects on a new breed of hackers.
Details of an extensive targeted attack against Swiss defense contractor RUAG were released by Switzerland’s national CERT.
The tenacious EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.