How (and Why) Hacker Forums Self-Moderate

“Everything in moderation,” the saying goes. But it may come as a surprise that this expression even seems to apply to many of the hacker forums littered across the dark web. On the surface, these forums may appear to be a lawless landscape, but there… Continue reading How (and Why) Hacker Forums Self-Moderate

Security and Culture are Key to Digital Transformation

With digital business initiatives accelerating across nearly every industry, Gartner projects worldwide IT spending to reach a whopping $4.1 trillion by the end of the year. This data reflects something every forward-looking business leader already kn… Continue reading Security and Culture are Key to Digital Transformation

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Deepfakes: The Next Big Threat

A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deepfake video. All it takes is a picture of, say, yourself that you’d swap with an actor in a movie or a telev… Continue reading Deepfakes: The Next Big Threat

Rising Threats Target Cloud Providers, Virtual Infrastructure

A growing number of cybercriminals are developing malware to conduct attacks on virtualized environments, and some are aggressively trying to exploit vulnerabilities already found in software for deploying virtual infrastructure, according to a report… Continue reading Rising Threats Target Cloud Providers, Virtual Infrastructure

The Second Wave of a Ransomware Pandemic

In January, we published the Ransomware Pandemic, a report discussing the ever-evolving threat of ransomware and the growing devastation disseminated by these malicious malware strains. The report discussed the future forecast for ransomware and how w… Continue reading The Second Wave of a Ransomware Pandemic

Cyber Games Offer Competitive Challenges

With high-profile public and private institutions in the U.S. facing a growing threat from cybercriminals and cyberattacks, there is a growing push to prepare the next generation of potential IT security pros to meet the challenges. Cyber games are on… Continue reading Cyber Games Offer Competitive Challenges

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Threat Modeling in the Age of Automation

Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can withstand fut… Continue reading Threat Modeling in the Age of Automation

Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Apple’s under fire yet again for iOS security bugs in WebKit—the code behind the Safari browser.
The post Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets appeared first on Security Boulevard.
Continue reading Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets