Hiring, Training and Human Oversight Can Help Battle Insider Threats, US State Department Official Says

Insider threats present themselves in a variety of ways, and a person isn’t always responsible. Most insider threats are a mix of technology, personnel, and security, according to officials from the US Department of State.
The post Hiring, T… Continue reading Hiring, Training and Human Oversight Can Help Battle Insider Threats, US State Department Official Says

Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Security researchers have followed the evolution of a piece of infostealer malware named Raccoon, as it’s being developed and enhanced to work in as many scenarios as possible, including email clients, Internet browsers, and more. Infostealers ar… Continue reading Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Google Removes 600 Apps from Play Store for Serving Disruptive Ads

Google has removed more than 600 apps from the Play Store and banned them from the Google AdMob and Google Ad Manager advertising platforms for violating policies on disruptive ads. The massive Google Play Store marketplace holds lots of interesting ap… Continue reading Google Removes 600 Apps from Play Store for Serving Disruptive Ads

Developers Hack McDonald’s Reward System to Get Free Hamburgers

A couple of German software developers discovered an oversight in McDonalds’ promotion systems that allowed them to get as many hamburgers as they wanted, without paying anything. While software vulnerabilities or loopholes are sometimes used for… Continue reading Developers Hack McDonald’s Reward System to Get Free Hamburgers

More than 44 Million Patient Health Records Compromised in 2019 in the US

Data breaches in the healthcare industry are on the rise in the United States, and more people are affected each year. While the number of breaches is rising, the number of affected patient records is soaring, having tripled since 2018.
The post M… Continue reading More than 44 Million Patient Health Records Compromised in 2019 in the US

Hamas Tries to Trick Israeli Soldiers into Installing Malware Using Fake Messages from Women

Dozens of Israeli soldiers were tricked by Hamas into installing malware on their phones and computers via an old ruse: messages from young women looking for companionship. Investing in security solutions is always a good idea, but what’s the poi… Continue reading Hamas Tries to Trick Israeli Soldiers into Installing Malware Using Fake Messages from Women