ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It
Even seeing data breaches in the news, more than half of consumers are still reusing passwords. Continue reading ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It
Collaborate Disseminate
Even seeing data breaches in the news, more than half of consumers are still reusing passwords. Continue reading ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It
A lack of awareness about where and how open-source libraries are being used is problematic, researchers say. Continue reading 70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs
Overall bot activity on the web has soared, with a 26 percent growth rate — attacks on applications, APIs and mobile sites are all on the rise. Continue reading ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel
Hundreds of thousands of malware files are disguised as well-known social conferencing and collaboration apps. Continue reading ThreatList: Skype-Themed Apps Hide a Raft of Malware
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket. Continue reading ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates
Larger SMBs are more likely to feel targeted by APTs. Continue reading ThreatList: 1 in 9 SMBs Believe Nation-State Actors Are Targeting Them
A successful attack could wreak havoc, given the potential for biometric forgery, and a lack of options in the event one’s biometric profile is stolen. Continue reading ThreatList: A Third of Biometric Systems Targeted by Malware in Q3
The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place. Continue reading ThreatList: Admin Rights for Third Parties is the Norm
Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found. Continue reading ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical
Consumers don’t vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ Continue reading ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones