Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries.
Most Commented Posts
Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age.
A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a critical RCE that could allow total system compromise.
A recently discovered malware steals cache data and messaging sessions from the desktop version of encrypted messaging service Telegram.
Yet another speculative execution side channel flaw has been disclosed in processors – and security experts warn that more may be out there.
A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year.
The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors.
Schneider Electric on Tuesday issued fixes for a vulnerability its SoMachine Basic software that could result in disclosure and retrieval of arbitrary data.
Privacy advocates say facial recognition can be an agent of authoritarian surveillance; others say it’s an invaluable tool to combat kidnapping, locate lost children and track down criminals on the run.
The new hardware-based protections Intel announced earlier in March it was embedding into new chips will only protect against Spectre and Meltdown – but not the newly disclosed Variant 4, sources said.
A bug in Comcast’s activation website for its Xfinity routers leaked sensitive customer data.
Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative execution side channel flaw that could allow attackers to access information.
Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news.
A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.
The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.
The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.
Analysis shows that the malware, previously a banking trojan focused on Android devices, has rapidly evolved just in the past month.
Records for a mobile app that parents can use to monitor what their kids are doing online has been exposed in the latest Amazon Web Services cloud misconfiguration.
A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites.