SMS About Bank Fraud as a Pretext for Voice Phishing
Most of us have probably heard the term “smishing” — which is a portmanteau for traditional ph ishing scams sent through SMS text messages. Smishi... Read more
Most of us have probably heard the term “smishing” — which is a portmanteau for traditional ph ishing scams sent through SMS text messages. Smishi... Read more
Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches... Read more
The U.S. Department of Justice today announced the arrest of Ukrainian man accused of deploying ransomware on behalf of the REvil ransomware gang... Read more
The holiday shopping season always means big business for phishers, who tend to find increased success this time of year with a time-honored lure abo... Read more
A number of publications in September warned about the emergence of “ Groove ,” a new ransomware group that called on competing extortion gangs to un... Read more
Virtually all compilers — programs that transform human-readable source code into computer-executable machine code — are vulnerable to an insidious a... Read more
In December 2018, bling vendor Signet Jewelers fixed a weakness in their Kay Jewelers and Jared websites that exposed the order information for... Read more
U.S. federal investigators today raided the Florida offices of PAX Technology , a Chinese provider of point-of-sale devices used by millions of busi... Read more
The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse t... Read more
On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state educ... Read more
A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete... Read more
Microsoft today issued updates to plug more than 70 security holes in its Windows operating systems and other software, including one vulnerabili... Read more
Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process of protecting y... Read more
Facebook and its sister properties Instagram and WhatsApp are suffering from ongoing, global outages. We don’t yet know why this happened, but... Read more
The mis-implementation of Elastic Stack, a collection of open-source products that employ APIs for crucial data aggregation, search, and analytics ca... Read more