Home Tags Cyber

Tag: Cyber

Cyber-thieves Using GiftGhostBot to Steal Gift Card Balances

Distil Networks discovers a new advanced persistent bot that is stealing money from gift cards at retailers around the world.

Intro to Cyber Insurance: 7 Questions to Ask

Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.

Privacy Advocates Vow to Fight Rollback of Broadband Privacy Rules

Privacy activists say rolling-back ISP privacy rules means health, financial and browsing habits can be used, shared and sold to the highest bidder without...

Instagram Adds Two-Factor Authentication

Instagram became the latest in a long line of services over the years to offer users two-factor authentication.

Threatpost News Wrap, March 27, 2017

The latest Wikileaks dump of Apple hacking tools, the LastPass vulnerabilities, and a new Android security report are discussed.

Adware Apps Booted from Google Play

More than a dozen apps removed from Google Play store after it was determined they were overly aggressive adware.

IRS makes tax refund scams harder but W-2 phishing attacks continue...

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber...

WikiLeaks Dump Shows CIA Interdiction of iPhone Supply Chain

Today's WikiLeaks Vault 7 Dark Matter release shows the CIA's capabilities to attack and persist on Apple iPhone and Mac firmware and an apparent...

Cisco Patches Critical IOx Vulnerability

Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.

Malware That Targets Both Microsoft, Apple Operating Systems Found

A new strain of malware is designed to spread malware on either Mac OS X or Microsoft Windows, depending on where it’s opened.

Half of Android Devices Unpatched Last Year

Google said half of Android devices are unpatched and that percentage of potentially harmful apps on phones installed from all sources rose in 2016.

Paper Spells Out Tech, Legal Options for Encryption Workarounds

Bruce Schneier and Orin Kerr have written a paper that explains the technological and legal issues associated with six encryption workarounds available to law...