Hertz, Clear Partner to Speed Rentals With Biometric Scans

Biometric screening is expanding to the rental car industry. Hertz said Tuesday it is teaming up with Clear, the maker of biometric screening kiosks found at many airports, in an effort to slash the time it takes to pick up a rental car. Clear hopes it will lead more travelers to its platform, which has […] more…

A Quick Introduction to the MITRE ATT&CK Framework

If you’re an avid reader of threat trends or a fan of red team exercises, you’ve probably come across a reference to the MITRE ATT&CK framework in the last few months. If you have ever wondered what it was all about or if you’ve never heard of it but are interested in how you can […] more…

Windows Kernel Vulnerability Exploited in Attacks

Microsoft’s Patch Tuesday updates for December 2018 address nearly 40 vulnerabilities, including a zero-day flaw affecting the Windows kernel. read more more…

Adobe Patches 87 Vulnerabilities in Acrobat Software

The December 2018 Patch Tuesday updates released by Adobe address a total of 87 vulnerabilities affecting the company’s Acrobat software. read more more…

OWASP Top 10 Security Risks – Part III

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top 10 security risks. The OWASP Top 10 list consists of the 10 most seen application vulnerabilities: Injection Broken Authentication Sensitive data exposure XML External Entities (XXE) Broken Access control Security misconfigurations Cross Site Scripting […] more…

Eight Major Elements Of Computer Security

National Institute Of Security Technology (NIST) lists 8 major elements of computer security 1. Computer security should support the mission of the organization. 2. Computer security is an integral element of sound management. 3. Computer security should be cost-effective. 4. Computer security responsibilities and accountability should be made explicit. 5. System owners have computer security […] more…

12 Days of Hack-mas

2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered personal information to personalize cyberattacks. Some worked to get us to download malware in order to help them mine cryptocurrency or harness our devices to join their botnets. And the ways in which they exact […] more…

New Exploit Kit Targets SOHO Routers

A newly identified exploit kit is targeting home and small office routers in an attempt to compromise the mobile devices or desktop computers connected to the routers, according to Trend Micro. read more more…

House Releases Cybersecurity Strategies Report

The U.S. House of Representatives’ Committee on Energy and Commerce has released a report identifying strategies for the prevention and mitigation of cybersecurity incidents. read more more…

Russian Critical Infrastructure Targeted by Profit-Driven Cybercriminals

Several critical infrastructure organizations in Russia have been targeted by hackers believed to be financially-motivated cybercriminals rather than state-sponsored cyberspies. read more more…

Italian Oil Services Company Saipem Hit by Cyberattack

Italian oil and gas services company Saipem reported on Monday that some of its servers were hit by a cyberattack. read more more…

Secure Messaging Applications Prone to Session Hijacking

Secure messaging applications such as Telegram, Signal and WhatsApp can expose user messages through a session hijacking attack, Cisco’s Talos security researchers warn.  read more more…

Google CEO Faces House Grilling on Breach, China Censorship

WASHINGTON (AP) — Google’s CEO faces a grilling from U.S. lawmakers on how the web search giant handled an alarming data breach and whether it may bend to Chinese government censorship demands. read more more…

Organizations Still Slow to Detect Breaches: CrowdStrike

Organizations are getting better at detecting intrusions on their own, but it still takes them a long time to do it, according to a new report published on Tuesday by endpoint security firm CrowdStrike. read more more…

Researchers Find Thousands of Twitter Amplification Bots in Just One Day

7,000 Twitter Amplification Bots Found in One Day’s Search read more more…

Dark web goldmine busted by Europol

What’s the safest way to buy counterfeit banknotes? Not on the dark web market, as 235 people have just discovered to their cost. more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News