| Security Research News |
| Showing 'Security Research News' from 71 to 80|
| |The UK Plans To Legislate To Secure IoT, But Is It Really The Answer? A reflection on whether this approach to addressing IoT security challenges can ‘deliver the goods’ and how consumer awareness can help in the grand scheme of things
The post The UK plans to legislate to secure IoT, but is it really...
| |World Password Day: A Day To Review Your Defenses So, do you think you’ve been ‘pwned’? That’s the question to ask yourself today
The post World Password Day: A day to review your defenses appeared first on WeLiveSecurity
| |D-Link Camera Vulnerability Allows Attackers To Tap Into The Video Stream ESET researchers highlight a series of security holes in a device intended to make homes and offices more secure
The post D-Link camera vulnerability allows attackers to tap into the video stream appeared first on WeLiveSecurity
| |From Third-party Android Store To SMS Trojan 1st May 2019 [24 days ago] from Zscaler In lieu of downloading and installing apps from the official Android app store, users often turn to third-party stores. The reasons vary, from wanting a particular app that isn’t available on the official store to seeking cracked apps—versions...
| |Data: E-Retail Hacks More Lucrative Than Ever For many years and until quite recently, credit card data stolen from online merchants has been worth far less in the cybercrime underground than cards pilfered from hacked brick-and-mortar stores. But new data suggests that over the past...
| |Buhtrap Backdoor And Ransomware Distributed Via Major Advertising Platform Criminal activities against accountants on the rise – Buhtrap and RTM still active
The post Buhtrap backdoor and ransomware distributed via major advertising platform appeared first on WeLiveSecurity
| |Tech Support Scam Employs New Trick By Using Iframe To Freeze Browsers We discovered a new technical support scam (TSS) campaign that makes use of iframe in combination with basic pop-up authentication to freeze a user’s browser. Since this technique is new and unfamiliar, it can potentially evade detection.
| |P2P Weakness Exposes Millions Of IoT Devices A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise,...
| |AESDDoS Botnet Malware Exploits CVE-2019-3396 To Perform Remote Code Execution, DDoS Attacks, And Cryptocurrency Mining Our honeypot sensors recently detected an AESDDoS botnet malware variant (detected by Trend Micro as Backdoor.Linux.AESDDOS.J) exploiting a server-side template injection vulnerability (CVE-2019-3396) in the Widget Connector macro in Atlassian...
| |BEC Fraud Losses Almost Doubled Last Year On the good news front, the FBI notes the success of its newly-established team in recovering some of the funds lost in BEC scams
The post BEC fraud losses almost doubled last year appeared first on WeLiveSecurity
| « Newer 3 4 5 6 7 8 9 10 11 12 Older » |