Web Searches Get Complicated! Avril Lavigne Tops the 2017 Most Dangerous Celebrities List

We surf the internet to find the latest celebrity gossip, discover a new song, and even interact with our favorite stars. And cybercriminals know that. In fact, they’re capitalizing on that by weaving in sneaky cyberthreats within celebrity sites. To see how cybercriminals take advantage of consumers’ obsession with pop culture, we conducted the 11th […] more…

Equifax Cybersecurity Failings Revealed Following Breach

Shortcomings revealed by researchers and cybersecurity firms following the massive data breach suffered by Equifax show that a successful hacker attack on the credit reporting agency’s systems was inevitable. read more more…

DOJ lets itself off the privacy hook

The Department of Justice has excused its insider threat database from multiple provisions of the 1974 Privacy Act more…

New Attack Fingerprints Users Using Word Documents

A newly detailed attack method leverages Microsoft Word documents to gather information on users, but doesn’t use macros, exploits or any other active content to do so, security researchers at Kaspersky Lab have discovered. read more more…

Chrome to brand FTP as “not secure”

With the release of Chrome 63 in December 2017 FTP will be branded “not secure” more…

Locky Ransomware Pushed Alongside FakeGlobe in Upgraded Spam Campaigns

By Julie Cabuhat, Michael Casayuran, Anthony Melgarejo In the beginning of September, a sizeable spam campaign was detected distributing the latest Locky variant. Locky is a notorious ransomware that was first detected in the early months of 2016 and has continued to evolve and spread through different methods, particularly spam mail. A thorough look at samples from […] more…

Windows 10 Users to Get Improved Privacy Controls

The upcoming Windows 10 Fall Creators Update will bring enhanced privacy controls to both consumers and commercial customers, Microsoft says. read more more…

Resolved: Penn State York Voice Services Migration

Voice services migration at the York campus has been completed. more…

CyberGRX Partners With BitSight to Address Supply Chain Risks

Partnership Integrates BitSight’s Security Ratings Capabilities With CyberGRX Third-Party Cyber Risk Exchange read more more…

Flaws Patched in Trend Micro Mobile Security for Enterprise

A patch released last week by Trend Micro for its Mobile Security for Enterprise product resolves several vulnerabilities, including remote code execution issues rated critical and high severity. read more more…

Access Account authentication service maintenance Sep 19

During the maintenance window on September 19, between 5 to 7 am, Penn State IT staff will perform maintenance on the Kerberos authentication service for Penn State Access Accounts. During this time, users may experience brief delays in authentication. This maintenance is being tracked in Service Now as CHG0044100. more…

Millions Download Maliciously Modified PC Utility

Infected CCleaner Utility Highlights Dangers of Software Supply Chain Attacks read more more…

Microsoft Extends Office Bounty Program

Microsoft has announced an extension to its Microsoft Office Bounty Program, which is now set to run until December 31, 2017. read more more…

Is universal end-to-end encrypted email possible (or even desirable)?

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full end-to-end encryption would  mean that only the receiver of the email can decrypt their messages, but sharing public keys and agreeing on a common encryption standard can be tricky for […] more…

Threat Report Says 1 in 50 iOS Apps Could Leak Data

A new global threat report for the mobile ecosystem shows that iOS provides a bigger threat than is often perceived. While the insecurities of the Android operating system are well-documented, the report notes that 1 in 50 iOS apps used in enterprise environments could potentially leak sensitive data. read more more…

iXintpwn/YJSNPI Abuses iOS’s Config Profile, can Crash Devices

by Hara Hiroaki, Higashi Yuka, Ju Zhu, and Moony Li While iOS devices generally see relatively fewer threats because of the platform’s walled garden approach in terms of how apps are installed, it’s not entirely unbreachable. We saw a number of threats that successfully scaled the walls in 2016, from those that abused enterprise certificates to […] more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News