Category: Uncategorized

1 330 331 332 333 334 442 2324 / 3093 POSTS
Rash Of Phishing Attacks Use HTTPS To Con Victims

Rash Of Phishing Attacks Use HTTPS To Con Victims

Scammers are increasingly abusing consumer awareness of sites that encrypt data sent over the internet using HTTPS, particularly through a spike in ph ...

Democracy-Minded Defcon Hackers Promise Punishing Probe On US Election Computers

Voting machine hacking could turn very ugly Organizers at the DEF CON hacking conference in July are planning a mass ...
Trump’s Dumps: ‘Making Dumps Great Again’

Trump’s Dumps: ‘Making Dumps Great Again’

It’s not uncommon for crooks who peddle stolen credit cards to seize on iconic American figures of wealth and power in the digital advertisements for ...
IDG Contributor Network: Eight steps to the GDPR countdown

IDG Contributor Network: Eight steps to the GDPR countdown

One year from today, the recently passed regulation known as “GDPR” (General Data Protection Regulation) goes into effect. While EU-specific, it can s ...
Revised Active Defense Bill Allows Victims to Recover or Destroy Stolen Data

Revised Active Defense Bill Allows Victims to Recover or Destroy Stolen Data

A controversial bill that would allow organizations that have been breached to hack back has undergone revisions that include an exemption permitting ...
MolinaHealthcare.com Exposed Patient Records

MolinaHealthcare.com Exposed Patient Records

Earlier this month, KrebsOnSecurity featured a story about a basic security flaw in the Web site of medical diagnostics firm True Health Group that le ...
The WannaCry scramble

The WannaCry scramble

A couple of weeks ago, possibly every security manager in the world was dealing with the repercussions of WannaCry, a ransomware worm that screamed ac ...
1 330 331 332 333 334 442 2324 / 3093 POSTS