In fact, Europol’s Internet Organised Crime Threat Assessment (IOCTA), named ransomware the top threat that companies, consumers, and the public sector faced in 2019.
John Fokker, McAfee |
05 Dec |
Read more
Computer-based facial recognition, in its earliest forms, has been around since the mid-1960s.
Steve Povolny, McAfee |
05 Dec |
Read more
The ability to create manipulated content is not new.
Steve Grobman, McAfee |
05 Dec |
Read more
With 2019’s headlines of ransomware, malware, and RDP attacks almost behind us, we shift our focus to the cybercrime threats ahead.
Raj Samani, McAfee |
05 Dec |
Read more
VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where mobile users access the network from a variety of locations and corporate assets reside in multi-cloud environments.
Neal Weinberg |
05 Dec |
Read more
Politicising cyber security only serves to undermine trust in its practices and objectivity, experts fear.
Cynthia Brumfield |
05 Dec |
Read more
Developers who use Python in open source projects should check they haven't downloaded these two malicious software libraries.
Liam Tung |
05 Dec |
Read more
International law enforcement effort kills a spyware tool used by thousands of customers.
Liam Tung |
04 Dec |
Read more
Slow progress on encrypting Android app communications, but it's finally picking up pace.
Liam Tung |
04 Dec |
Read more
Retailers are well aware that the increasing levels of transactions over the Black Friday-to-Cyber Monday long shopping weekend make them vulnerable to fraud and malware – and the actual levels of compromise will soon become clear in the wake of warnings that online shoppers were being targeted with malicious mobile apps and web sites.
David Braue |
03 Dec |
Read more
The ease with which cloud-based architectures facilitate third-party communications will make them a key security risk in coming years, security experts have warned as Australian firms rush headlong into the cloud without fully considering its implications.
By David Braue |
02 Dec |
Read more
Greenfields build allowed security to be positioned as a central concern; cloud tools and broad stakeholder buy-in have kept it that way
David Braue |
29 Nov |
Read more
Federal agencies face a tight timeline to implement vulnerability disclosure programs. But the government wants to make it easy for the public to report bugs in internet-facing government systems.
Liam Tung |
29 Nov |
Read more
Shoppers face a minefield of fraudulent mobile apps and web sites
David Braue |
28 Nov |
Read more
Spanish security firm could face large ransom demands from cyber attackers.
Liam Tung |
28 Nov |
Read more
Get ready to hear a whole lot more from Google’s Threat Analysis Group, TAG.
Liam Tung |
27 Nov |
Read more
An insecure website gives access to attackers on thousands of kids and allows them to connect to kids' watches with the same privileges as parents.
Liam Tung |
26 Nov |
Read more
Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.
Cynthia Brumfield |
26 Nov |
Read more
Yet even where companies have proven their compliance with security best practice, that doesn’t mean they will always continue to be great, as a review of PCI DSS practice confirmed in concerning detail.
David Braue |
25 Nov |
Read more
In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything in any part of the world.
Cynthia Brumfield |
23 Nov |
Read more