Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Complying with CCPA: Answers to common questions

What it takes to become an application security engineer

What it takes to become an application security engineer

Application security engineers earn more money than application engineers and are in high demand, but the job requires additional training in security.

Quarter of firms can't fill open infosec positions

Quarter of firms can't fill open infosec positions

The information security industry hasn't made any significant strides in addressing the workforce shortage, according to a report released this morning by ISACA.

Flood of threat intelligence overwhelms many firms

Flood of threat intelligence overwhelms many firms

Three years after Target missed alerts warning them abut a massive data breach, the amount of threat information coming in from security systems is still overwhelming for many companies, due to lack of expertise and integration issues....

Why don't developers have a 'spell check' for security'?

Why don't developers have a 'spell check' for security'?

Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities. Of course, nobody is perfect. We all make mistakes, and as software projects get more and more complex,...

Cerber ransomware earns $2.3M with 0.3% response rate

Cerber ransomware earns $2.3M with 0.3% response rate

The fast-growing Cerber ransomware earned nearly $200,000 in July despite a payment rate of just 0.3 percent as a result of its affiliate distribution model, according to a new report by Check Point

10 riskiest applications that have passed their expiration dates

10 riskiest applications that have passed their expiration dates

Applications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates. Keeping them around create a security hole.

9 in 10 directors support regulatory action on cybersecurity

9 in 10 directors support regulatory action on cybersecurity

In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven't taken reasonable steps to secure customer data.

East European botnet targets Russian banks

East European botnet targets Russian banks

Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception, according to a new report from the Dell SecureWorks’ Counter Threat Unit.

CSOs demanding more from cybersecurity tech

CSOs demanding more from cybersecurity tech

CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and to take more risks on new and innovative approaches

Despite recent moves against Adobe, 80% of PCs run expired Flash

Despite recent moves against Adobe, 80% of PCs run expired Flash

Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end users, with 80 of computers running an end-of-life version of the plugin...

Iranian hackers get tech support on forums

Iranian hackers get tech support on forums

Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.

Load More