Who will own the data from your autonomous car?

If you’re hoping that Congress to lock in protection for your privacy, you should probably lower your expectations Source: Naked Security Sophos Who will own the data from…

Hijacked Extensions Put 4.7 Million Chrome Users at Risk

More than 4.7 million users were apparently exposed to potentially malicious ads and credential theft after cybercriminals managed to hijack the developer accounts of several popular Chrome extensions. read more…

Google Removes Chrome Extension Used in Banking Fraud

Google has removed the Interface Online Chrome extension from the Chrome Web Store. The plugin was used by criminals in Brazil to target corporate users with the aim of stealing…

Pulse Wave – New DDoS Assault Pattern Discovered

A new method of carrying out DDoS attacks named Pulse Wave is causing problems to certain DDoS mitigation solutions, allowing attackers to down servers previously thought to be secured. […] …

Get to Know Your Business Groups and Reap Big Dividends

When I first started working in private sector security after leaving the military, I took an approach that I see a lot of CISOs taking today. read more …

Google Chrome : Attention aux extensions compromises par des pirates

Des cybercriminels non identifiés à ce jour piratent des comptes développeurs liés à des extensions populaires du navigateur Web Google Chrome afin de les compromettre. Près de 5 millions d’utilisateurs…

Bot armies of fake followers are the footsoldiers of fake news

Actual humans are left in the dust by the army of bots who pick up and amplify fake news – but how should they be stopped? Source: Naked…

O2Switch – Présentation de l’un des meilleurs hébergeurs Web français !

Il s’avère que O2Switch fait aujourd’hui bien mieux que la majeure partie de ses concurrents, et qu’il réside à chaque fois dans le top des meilleures hébergeurs Web du moment….

Is There a Future of Security Without People? 

For those of us tasked with managing, storing and securing information, it’s difficult to imagine automation will assume these roles. In recent years, much of the angst over labor-replacing automation…

Respond Software Automates SOC Analyst Decisions

Mountain View, Calif.-based Respond Software has emerged from stealth mode with a new product designed to automate the role of security analysts and $12 million in funding. read more …

Cerber Ransomware Creates Self-Inflicted Canary Vaccine

Researchers Say Cerber Ransomware Now Has a Feature to Avoid Triggering “Canary Files” read more Source: Security Week Cerber Ransomware Creates Self-Inflicted Canary Vaccine

Toronto woman joins the fight against creepshot image sites

There are tools that can help track down and take down stolen and creepshot images of women – but the challenge is a tough one Source: Naked Security Sophos…

Backdoor Found in Enterprise Software Used by Banks, Tech, and Energy Companies

A group with possible links to Chinese hackers has managed to break into the servers of NetSarang — a South Korean software maker — and has hidden a backdoor in…

Amazon Unveils Machine Learning Security Service

Amazon Launches “Macie” Security Service to Protect Data in AWS read more Source: Security Week Amazon Unveils Machine Learning Security Service

Lone Nigerian Hacker Behind Attempted Hacks at 4,000 Organizations

One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by…

Previous Page · Next Page