24 articles
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
Information security measures are far more effective when supported by top management. How to get this support?
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Olympic phishing, medical records hacked, police giving away infected USB drives and more.
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
Think connected toys for kids are more secure than those for adults? Think again.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here’s what you should do.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Remember the beginning of Terminator 2: The Judgement Day where John Connor is shown hacking an ATM with an Atari Portfolio?
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Threatpost security reporters Chris Brook and Brian Donohue discuss the Github DDoS, Dyre banking malware, privacy threats, hacking and more
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,