News Clipping

Poor security habits are the ideal recipe for a breach [source: helpnetsecurity]

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees who have more access to sensitive resources than they should and who follow poor security habits. Have you ever “bent the rules” or found a security workaround in order to get something done at work? Results from...

Read More


Experts observed a new wave of malware attacks targeting WordPress sites [source: securityaffairs]

Experts from the firm Sucuri observed a new wave of wp-vcd malware attacks that is targeting WordPress sites leveraging flaws in outdated plugins and themes A new malware campaign is threatening WordPress installs, the malicious code tracked as wp-vcd hides in legitimate WordPress files and is used by attackers to add a secret admin user and gain full control over infected websites. The malware was first spotted in...

Read More


Risk Assessment in Information Security [source: infosecurity-magazine]

Risk assessment is a systematic method of analyzing risk. It started in the nuclear and aeronautical industries, and has now spread to many other industries including the finance, transportation, power system, public health, shipping and fishing industries. Risk assessment tries to answer three questions: What can go wrong? How likely is it? How serious are the consequences? Risk assessment has different roles in different industries....

Read More


Android Bug Lets Attackers Record Audio & Screen Activity [source: bleepingcomputer]

Android smartphones running Lolipop, Marshmallow, and Nougat, are vulnerable to an attack that exploits the MediaProjection service to capture the user’s screen and record system audio Based on the market share of these distributions, around 77.5% of all Android devices are affected by this vulnerability. Vulnerability resides in Android MediaProjection service To blame is MediaProjection, an Android service that is capable of capturing screen contents...

Read More


Google: There are 1.9 billion usernames and passwords on the black market [source: v3.co.uk]

Research by Google and the University of California has found that there are more than 1.9 billion usernames and passwords available on the black market, many of which can be used to access Google accounts. According to the study, cybercriminals are gaining access to people’s passwords and flogging them on the dark web at a profit. The researchers used Google’s proprietary data to see whether or not...

Read More


Page 89 of 123« First...102030...8788899091...100110120...Last »