The Evolving Role of the CISO
Curtis Simpson, CISO at Armis, discusses the top qualities that all CISOs need to possess to excel. [...]
Curtis Simpson, CISO at Armis, discusses the top qualities that all CISOs need to possess to excel. [...]
Candiru, aka Sourgum, allegedly sells the DevilsTongue surveillance malware to governments around the world. [...]
The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners. [...]
At least 25 apps have lured in tens of thousands of victims with the promise of helping them cash in on the cryptomining craze. [...]
The apps all used an unusual tactic of loading a legitimate Facebook page as part of the data theft. [...]
Nate Warfield, CTO of Prevailion and former Microsoft security researcher, discusses the many security challenges and failings plaguing this industry. [...]
A survey from GSMA and Trend Micro shows a concerning lack of security capabilities for private 5G networks (think factories, smart cities, industrial IoT, utilities and more). [...]
One in five of the most-popular apps for kids under 13 on Google Play don't comply with COPPA regulations on how children's information is collected and used. [...]
... until you reset network settings and stop connecting to a weirdly named network, that is. FUD is spreading. iOS Wi-Fi demolition is not. [...]
Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter. [...]
Google has patched its Chrome browser, fixing one critical cache issue and a second bug being actively exploited in the wild. [...]
Google's June security bulletin addresses 90+ bugs in Android and Pixel devices. [...]
Malicious apps make up 2 percent of top grossing apps in Apple App Store. [...]
On June 8, Amazon’s pulling all its devices into a device-to-device wireless mix, inspiring FUD along the way. Now's the time to opt out if you're be-FUDdled. [...]
Several mobile apps, some with 10 million downloads, have opened up personal data of users to the public internet – and most aren't fixed. [...]
Enterprises are embracing on-demand freelance help – but the practice, while growing, opens up entirely new avenues of cyber-risk. [...]
On Wednesday, Google quietly slipped updates into its May 3 Android security bulletin for bugs that its Project Zero group has confirmed are zero-days. [...]
Work's being done with uber-lightweight nanoagents on every IoT device to stop malicious behavior, such as a scourge of botnet attacks, among other threats. [...]
Attackers can take advantage of the fact these apps access, gather, store and transmit more information than any other app their victims have installed. [...]
Anurag Kahol, CTO at Bitglass, discusses options for detecting malicious or dangerous activity from within an organization. [...]
Keynoters from Cisco, Netflix and RSA highlighted lessons from the last year, and cybersecurity's new mandate in the post-pandemic world: Bounce back stronger. [...]
Tony Lauro, director of security technology and strategy at Akamai, discusses hardware security dongles and using phones to act as surrogates for them. [...]
The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers. [...]
A new type of fraud is spiking across the platform: Selling fake vax records to people who want to lie their way into places where proof of vaccine is required. [...]
Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're in range. [...]