Week in review: New LTE attacks, Android P security, backdooring connected cars

Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be able to solve all your security needs immediately with a small budget, but the … Continue reading Week in review: New LTE attacks, Android P security, backdooring connected cars

Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, information security leaders must aim to automate as much of the IR cycle as poss… Continue reading Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity

Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have discovered that, for the last couple of years, a few underground vendors have bee… Continue reading Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity

Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape

Here’s an overview of some of last week’s most interesting news and articles: When crypto-mining malware hits a SCADA network Radiflow has recently discovered Monero-mining malware on five servers of a water utility company located in Europ… Continue reading Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape

Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry

Here’s an overview of some of last week’s most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social engineering How did British teenager Kane Gamble, who at the time was only 15 years ol… Continue reading Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry

Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks

Here’s an overview of some of last week’s most interesting news and articles: Norwegian health authority hacked, patient data of nearly 3 million citizens possibly compromised Hackers have breached the systems of the Southern and Eastern No… Continue reading Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection

Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs and Border Protection agency released an update to its Directive governing Bord… Continue reading Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection

Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP la… Continue reading Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE

Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS

Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes via email: a free trial of Gunbot, a new bitcoin trading bot developed by Gu… Continue reading Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS