RSA 2019: Protecting your privacy in a NIST and GDPR world
Protecting your privacy is no longer just an option but a legal requirement in many parts of the world
Protecting your privacy is no longer just an option but a legal requirement in many parts of the world
The need for better balance on International Women's Day 2019. The Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018. Plus people should waste no time in updating Chrome to the browser's latest version.
Every year on March 8, we celebrate International Women's Day to honor the social, economic, cultural and political achievements of women. But we also acknowledge that there is still a long way to go before we’ve truly reached gender parity. This day gives us the opportunity to reflect on how we can achieve that balance. So it’s particularly fitting that the theme of this year’s International Women’s Day is “Balance for Better”
It now turns out that the vulnerability in the browser was being exploited in tandem with a zero-day in Windows
Some things that businesses can do to get better at it without breaking the bank
The latest report from the Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018
A ‘white hat’ from Argentina has come a long way since winning his first reward of US$50 in 2016
Coinhive cryptocurrency miner to call it a day. Google aims for password-free app and site logins on Android. Plus escalating DNS attacks have domain name steward worried.
The first virtual concert to take place inside a video game attracted interest not only from players but also from scammers, who tried to take advantage of the huge event by tricking users into buying tickets even though the concert was free
The organization was the victim of a watering hole attack, likely attributable to the APT LuckyMouse group
The service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads
Following the revelation that a list containing millions of stolen usernames and passwords had appeared online, we tell you a few different ways to find out if your credentials were stolen in that—or any other—security breach
With FIDO2 certification for Android, Google is setting the stage for password-less app and website sign-ins on a billion devices
The keeper of the internet’s ‘phone book’ is urging a speedy adoption of security-enhancing DNS specifications
A new report shines some light on multiple aspects of the growing threat of cyber-extortion
Head of the AI/ML Team at ESET, Juraj Jánošík, looks at machine learning and cybersecurity and considers whether it is a step toward a safer world or a step closer to the brink of chaos
As the use of this technology grows so does the risk that attackers may hijack it
And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year
Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities