| Security Research News |
| Showing 'Security Research News' from 91 to 100|
| |Beyond KrØØk: Even More Wi‑Fi Chips Vulnerable To Eavesdropping At Black Hat USA 2020, ESET researchers delved into details about the KrØØk vulnerability in Wi-Fi chips and revealed that similar bugs affect more chip brands than previously thought
The post Beyond KrØØk: Even more Wi‑Fi chips...
| |Blackbaud Data Breach: What you Should Know Here’s what to be aware of if your personal data was compromised in the breach at the cloud software provider
The post Blackbaud data breach: Whatyou should know appeared first on WeLiveSecurity
| |Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were...
| |Bypassing MassLogger Anti-Analysis — A Man-in-the-Middle Approach The FireEye Front Line Applied Research Expertise (FLARE) Teamattempts to always stay on top of the most current and emergingthreats. As a member of the FLARE Reverse Engineer team, I recentlyreceived a request to analyze a fairly new...
| |Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020. The recent campaigns...
| |NSA Shares Advice On How To Limit Location Tracking The intelligence agency warns of location tracking risks and offers tips for how to reduce the amount of data shared
The post NSA shares advice on how to limit location tracking appeared first on WeLiveSecurity
| |Porn Clip Disrupts Virtual Court Hearing For Alleged Twitter Hacker Perhaps fittingly, a Web-streamed court hearing for the 17-year-old alleged mastermind of the July 15 mass hack against Twitter was cut short this morning after mischief makers injected a pornographic video clip into the proceeding.
| |Repurposing Neural Networks To Generate Synthetic Media For Information Operations FireEye’s Data Science and Information Operations Analysis teamsreleased this blog post tocoincide with our Black Hat USA 2020 Briefing, which details howopen source, pre-trained neural networks can be leveraged to generatesynthetic media...
| |FBI Warns Of Surge In Online Shopping Scams In one scheme, shoppers ordering gadgets or gym equipment are in for a rude surprise – they receive disposable face masks instead
The post FBI warns of surge in online shopping scams appeared first on WeLiveSecurity
| |Announcing The Seventh Annual Flare-On Challenge The FireEye Labs Advanced ReverseEngineering (FLARE) team is honored to announce that the popularFlare-On challenge will return for a triumphant seventh year. Ongoingglobal events proved no match against our passion for creatingchallenging...
| « Newer 5 6 7 8 9 10 11 12 13 14 Older » |