Most alarming is not what’s new in Verizon’s 2016 Data Breach Investigations Report, rather what’s old and still causing chaos behind corporate firewalls.
Browsing Author: Tom Spring
Drive-by exploits install ransomware on outdated Android devices using a stolen Hacking Team exploit and the first weaponized Towelroot attack.
Was the Federal Bureau of Investigation justified in paying over $1.3 million for a hacking tool that opened the iPhone 5c of San Bernardino terrorist?
A report released Thursday shines a bright light on point-of-sales system attack targeting hospitality and retail businesses that could have earned cyber crooks a $400 million payday.
Messaging platform firm Viber is adding end-to-end encryption to 711 million of its users, becoming the latest tech firm to embrace encryption on a massive scale.
Apple and the FBI vow to work together to find compromise solution in encryption debate.
Tibetans along with journalists and human rights workers in Hong Kong and Taiwan have been targeted in campaigns using phishing emails laced with Microsoft RTF attachments that exploit four vulnerabilities.
Cisco Talos said that 3.2 million servers are vulnerable to the JBoss flaw used as the initial point of compromise in the recent SamSam ransomware attacks.
Privacy advocates are cheering Microsoft’s lawsuit against the US government over data requests.
While civil liberties advocates celebrate the defeat of California bill AB 1681, they caution that the fight to protect encryption from government regulation is not over.