LastPass: The crooks used a keylogger to crack a corporatre password vault
Seems the crooks implanted a keylogger via a vulnerable media app (LastPass politely didn’t say which one!) on a developer’s home computer. more…LastPass: Keylogger on home PC led to cracked corporate password vault
Seems the crooks implanted a keylogger via a vulnerable media app (LastPass politely didn’t say which one!) on a developer’s home computer. more…Cyber Insights 2023 | Quantum Computing and the Coming Cryptopocalypse
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…How to Stay One Step Ahead of Hackers
Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network. You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data […] more…2017 security predictions
From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election — 2016’s been a hell of a year in cybersecurity, and it’s not over yet. There’s no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…Not so Hack-tastic: Cyber Scams Cost Banks, and You, Millions
This year may just be deemed the era of the cyber security breach, with scores of online attacks running up millions of dollars in damages to a number of financial institutions. The tactics used range from revenge-focused “hacktivism” to illicit credit card scandals—a variety of scams that emphasize just how important it is to use […] more…More information
- Firefox 116 Patches High-Severity Vulnerabilities
- Phishing Platform LabHost Shut Down by Law Enforcement
- Microsoft Internet Explorer CVE-2013-3152 Memory Corruption Vulnerability
- Microsoft says new Kinect for Windows sensor coming in 2014
- IDC on Edge Protection Analyst Report
- Cisco Security Manager CVE-2019-12630 Java Deserialization Command Execution Vulnerability
- Helping Kids Understand Their ‘Digital Footprint’
- Is Your Teen Using Tinder? Here’s What You Need to Know
- Apple gets around to patching all the other High Sierra security holes
- How to shop for enterprise firewalls