CISA and UK’s NCSC attribute the new malware exploit framework to Russia’s Sandworm group
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has posted a new alert in conjunction with its U.K. counterpart, the National Cyber Security Center (NCSC) to identify a new malware called...
I’ve heard this song before…
Around 15 years ago, Apple was engaged in an advertising battle against Microsoft, in which the “cool computer company” poked fun at its competitor’s susceptibility to viruses. Of course, one of the reasons for that weakness, was the sheer size...
As athletes battle it out on the rinks and slopes of the Pyeongchang Olympics, a quieter fight is underway on Olympic networks. The "Olympic Destroyer" attack has reportedly caused disruptions to the event's Wi-Fi network and took down the official web site just as...
New Trend Micro report highlights common tactics used by cyber criminals this year
Trend Micro, a cybersecurity solutions company, released its “2017 Midyear Security Roundup: The Cost of Compromise” report, highlighting security threats for the first half of 2017. The company claims to have detected...
A recent rash of malware attacks on Microsoft’s RDP calls into question current thinking in terms of battling Trojan attacks.
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something...
AT&T is reportedly suing three former employees for accepting money from another company to put unlocking software on its devices.
The report names Marc Sapatin, Nguyen Lam and Kyra Evans as the defendants in the case, which was filed last week with Seattle’s US District...
Malware will lock users out of their devices then demand money transfer to regain access
WASHINGTON – How much would you pay to have your smartphone released if it were hijacked? It sounds like a joke, but according to the Cisco 2015 Midyear Security Report,...