Fake Elder Scrolls Online developers go phishing on PlayStation

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Read more

New version of IcedID Trojan uses steganographic payloads

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Read more

IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Read more

A week in security (October 14 – 20)

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Read more

When can we get rid of passwords for good?

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Read more

Medical industry struggles with PACS data leaks

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Read more

A week in security (April 1 – 7)

A roundup of cybersecurity news from April 1–7, including global data privacy laws, water plant cybersecurity, and the mysterious story of a 23-year-old woman’s visit to the Mar-a-Lago resort in Florida.

Read more

Facebook’s plain text misstep, and other password sins

Yes, Facebook’s recent error in password handling was egregious. But there’s more than one way to abuse user data. We take a look at various missteps in credential management and how businesses can improve practices.

Read more

Zombie email rises from grave after eight years of radio silence

What do you do when an email account you assumed was long gone comes back to life after eight years?

Read more

Collection 1 data breach: what you need to know

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Read more

Select your language