Security news, trends, analysis and practical advice

privacy policy unlocked padlock
isabelle falque pierrotin in brussels

Mobile security

Penn. man gets 18 months for celeb hacking

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people.

security code big data cyberespionage DDoS

Malware from last week's DDoS attack continues to harass

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since been found assaulting new targets -- possibly video gamers.


Windows 10 quick tips: How to protect your privacy

Worried about possible privacy problems in Windows 10? Now updated for the Windows 10 Anniversary Update, this story offers some quick and easy ways to protect your data.

20161026 arm mbed sign at arm techcon 2016

To solve IoT security, look at the big picture, ARM says

The recent DDoS attacks demonstrate that IoT spans all parts of IT. That was the message from ARM, the chip design company behind nearly every smartphone and a big chunk of IoT, at its annual TechCon event.

FCC building in Washington

FCC tells ISPs to get customer permission before sharing sensitive info

The Federal Communications Commission has passed rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation and financial details with...

icarus drone hijacking

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology.

penny pritzker vera jourova privacy shield

Privacy group shoots legal arrow at Privacy Shield

Privacy Shield, the legal agreement allowing businesses to export Europeans' personal information to the U.S., is under fire.

shark malware

Microsoft adds macro blocker to Office 2013 to stymie old-school attackers

IT admins have been able to block macros from running in Office 2016 since March.

padlock chain

Protection is dead. Long live detection.

As critical as it is, protection will fail. You need robust detection as well.


DDoS attack on Dyn came from 100,000 infected devices

DNS Service provider Dyn said that Friday's massive internet disruption came from hackers using an estimated 100,000 devices, many of which have been infected with a notorious malware that can take over cameras and DVRs.

cloud question mark confusionjpg

How not to announce a company launch

I receive dozens of press releases every day. They're hard to write well, and Nubeva's launch shows that.

adobe flash player v10 icon

Emergency Flash Player patch fixes zero-day critical flaw

Adobe Systems released an emergency patch for Flash Player in order to fix a critical vulnerability that attackers are already taking advantage of.

security code big data cyberespionage DDoS

Attackers abuse exposed LDAP servers to amplify DDoS attacks

Attackers are abusing yet another widely used protocol in order to amplify distributed denial-of-service attacks: the Lightweight Directory Access Protocol (LDAP), which is used for directory services on corporate networks.

DDoS Outage Map

Researchers blame Dyn DDoS attack on script kiddies targeting video game company

Flashpoint researchers blamed Oct. 21 IoT-based DDoS attack on script kiddies from hackforums, claiming a 'well-known video game company' was the target. A post on hackforums claims the target was the PlayStation Network.

DDoS Outage Map

DDoS attack shows dangers of IoT 'running rampant'

The DDoS attack launched Friday against Dyn should serve as a "wake-up call about security issues across IoT," said one cybersecurity expert.

schneider electric modicon m340 plc

Workstation software flaw exposes industrial control systems to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations.

Security online

Critical account creation flaws patched in popular Joomla CMS

The Joomla developers are warning website administrators to apply an update for the popular content management system that fixes two critical vulnerabilities.

iot security

ARM builds up security in the tiniest IoT chips

ARM will introduce processors that are just a fraction of a millimeter across and incorporate the company’s TrustZone technology.

Load More