By Eduard Kovacs

The Internet Bug Bounty (IBB), a project whose goal is to make the Web safer by rewarding white hat hackers who find vulnerabilities in core Internet infrastructure and open source software, announced on Friday that it has secured a $300,000 donation.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Kevin Townsend

The ‘splash screens’ of seventy-six different types of ransomware have been analyzed by a cyber-psychologist from De Montfort University.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Ionut Arghire

After introducing the product at the Google I/O conference in May, Google has now made its Play Protect security services available to all Android users.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

The Cisco® 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential “destruction of service” (DeOS) attacks.

…read more

Source:: Security magazin


Print pagePDF pageEmail page

By Eduard Kovacs

A British man pleaded guilty last week in a German court to launching a cyberattack that resulted in more than one million customers of telecommunications provider Deutsche Telekom experiencing Internet disruptions.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Kevin Townsend

The three primary trends in the incidence of destructive cyber-attacks are that they are increasing; they are usually state-sponsored; and they do not, apart from a few rare occurrences, involve anything more than basic tools. Potentially more concerning for private industry, however, is a lack of concern over what, in kinetic warfare, would be termed ‘collateral damage’.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Michael Mimoso

This week at Black Hat, Mac malware expert Patrick Wardle will describe how he used a custom-built command and control server to analyze new spying capabilities in a variant of the FruitFly backdoor. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Eduard Kovacs

A China-linked cyber espionage group tracked by security firms as Lotus Blossom, Elise, Esile and Spring Dragon has used more than 600 malware samples in its attacks over the past years, according to Kaspersky Lab.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Michael Adler

Prioritizing Security Alerts

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Mike Lennon

Managed Security Operations Centers (SOC): Why Some Fail

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

404 Not Found

Not Found

The requested URL /content.php was not found on this server.