Cybersecurity News Blog

Not good: Ransomware is cheap to buy and developers are well paid

Not good: Ransomware is cheap to buy and developers are well paid

This fact rarely comes out on Law & Order, but for some crime pays. And pretty well. A report by Carbon Black that studied 21 of the largest dark web markets in August and...

Endpoint, cloud, people key to future cyber security, says McAfee

Endpoint, cloud, people key to future cyber security, says McAfee

Endpoint devices, the cloud and people will be the security control points of the future, according to the chief of security firm McAfee. Looking to the future of cyber security, endpoints will be redefined,...

A Nobel-Winning Solution to Cyber Security

A Nobel-Winning Solution to Cyber Security

Professor Richard Thaler this week collected a Nobel Prize for his insights into behavioral economics—the idea that, contrary to economic theory, humans are not rational actors when it comes to financial decisions, but can...

Energy Sector Ups Cybersecurity Amid Growing IT Threats

Energy Sector Ups Cybersecurity Amid Growing IT Threats

The energy sector is sharpening its focus on cybersecurity amid growing concerns about IT threats. The digitization of the grid and the proliferation of renewable energy create opportunities for hackers that haven’t been fully explored. Even...

Are The Equifax, SEC and Deloitte Cybersecurity Breaches Desensitizing Society To This Threat?

Are The Equifax, SEC and Deloitte Cybersecurity Breaches Desensitizing Society To This Threat?

Every organization has a series of high-risk crisis scenarios that are the most likely, high-impact, types of crises to strike. One of these high-risk scenarios, which pertains to every organization today, is a cybersecurity...

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

We’ve all seen the news reports, again and again: A massive breach has occurred. Many millions of customer records have been obtained by hackers. The company in question has flubbed the response to the...

TAKING STOCK OF TRUMP’S CYBERSECURITY EXECUTIVE ORDER SO FAR

TAKING STOCK OF TRUMP’S CYBERSECURITY EXECUTIVE ORDER SO FAR

By the time President Trump signed his Cybersecurity Executive Order on May 11, it had taken on a mythic air. The administration had produced a series of drafts soon after the inauguration that leaked,...

3 Ways Blockchain Is Revolutionizing Cybersecurity

3 Ways Blockchain Is Revolutionizing Cybersecurity

The second quarter of 2017 was a wild one for blockchain companies and investors, with nearly 60 initial coin offerings (ICOs) closed in the quarter for more than $750 million, and it looks like this...

HBO social media hacked in latest cyber security breach

HBO social media hacked in latest cyber security breach

HBO’s Facebook and Twitter accounts have been compromised in the latest cyber security breach to hit the firm. A group called OurMine appeared to take control of the main HBO accounts, as well as...

Invisible Man malware lifts banking credentials by abusing Android accessibility services

Invisible Man malware lifts banking credentials by abusing Android accessibility services

A family of malware known as “Invisible Man” abuses Android OS accessibility services in order to steal users’ banking credentials. Invisible Man, also known as “Svpeng”, has earned quite a reputation for itself in...