| Security Research News |
| Showing 'Security Research News' from 1 to 10|
| |Fake Photo Beautification Apps On Google Play Can Read SMS Verification Code To Trigger Wireless Application Protocol (WAP)/Carrier Billing We found an app on Google Play named “Yellow Camera”, which poses as a camera and photo beautification or editing app embedded with a routine of reading SMS verification codes from the System Notifications, and, in turn, activate a...
| |Fleecing The Onion: Darknet Shoppers Swindled Out Of Bitcoins Via Trojanized Tor Browser ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers
The post Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser appeared first...
| |Best Practices For Adding Layered Security To Azure Security With Check Point’s CloudGuard IaaS Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices.
The post Best practices for adding layered security to Azure security with Check Point’s CloudGuard...
| |Definitive Dossier Of Devilish Debug Details – Part Deux: A Didactic
Deep Dive Into Data Driven Deductions In PartOne of this blog series, Steve Miller outlined what PDB pathsare, how they appear in malware, how we use them to detect maliciousfiles, and how we sometimes use them to make associations about groupsand actors.As Steve continued...
| |What Was Wrong With Alexa? How Amazon Echo And Kindle Got KRACKed ESET Smart Home Research Team uncovers Echo, Kindle versions vulnerable to 2017 Wi-Fi vulnerabilities
The post What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed appeared first on WeLiveSecurity
| |Operation Ghost: The Dukes Aren’t Back – They Never Left ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families
The post Operation Ghost: The Dukes aren’t back – they never left appeared first on WeLiveSecurity
| |When Card Shops Play Dirty, Consumers Win Cybercrime forums have been abuzz this week over news that BriansClub -- one of the undergrounds largest shops for stolen credit and debit cards -- had been hacked, and its inventory of 26 million cards leaked to security contacts in the...
| |Top 6 Email Security Best Practices To Protect Against Phishing Attacks And Business Email Compromise What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.
| |Guarding Against Supply Chain Attacks—Part 1: The Big Picture Paying attention to every link in your supply chain is vital to protect your assets from supply chain attacks.
The post Guarding against supply chain attacks—Part 1: The big picture appeared first on Microsoft Security.
| |Microsoft’s 4 Principals For An Effective Security Operations Center Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.
The post Microsoft’s 4 principals for an effective security operations center appeared...
| 1 2 3 4 5 6 7 8 9 10 Older » |