Video conferencing and collaboration systems are must-have tools for global companies. But new research by Forescout illustrates that elementary security errors in one vendor's system could have allowed attackers to snoop on meetings and view sensitive documents.
A new cyberespionage campaign has targeted hundreds of manufacturing and other industrial firms in South Korea and has spread to other parts of Asia and Europe, CyberX reports. The apparent goal of the campaign is to steal trade secrets and intellectual property as well as credentials.
IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost.
To help enhance security, Firefox extension developers will be required to set up their accounts to support two-factor authentication beginning early next year, Mozilla, the open source community that supports the browser, has announced.
Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights.
The long-awaited personal data protection bill, which was expected to be cleared by the Indian Parliament this year, has been put on hold yet again following serious concerns raised about recent changes in the proposal. It's been referred to a joint parliamentary committee for further review.
Suspicious code uploaded to VirusTotal points to Ryuk ransomware being used in a crypto-locking malware attack against New Orleans. Mayor LaToya Cantrell has declared a state of emergency and the city is continuing its recovery, noting that no emergency services have been affected.
Encrypted chat and messaging application Keybase has found out what happens when you wrap a cryptocurrency giveaway into your service. In short: Everyone comes out the woodwork to try to get a slice of the pie.
What connected devices are sneaking into the enterprise, and the advent of 5G technology only broadens the potential attack surface. Diana Kelley of Microsoft discusses the growing risks from connected devices and how to approach mitigation in 2020.
How confident are security leaders in their enterprise cybersecurity posture? And in turn, how are business leaders marketing cyber confidence to customers and partners? Alex Pitigoi of Nominet shares insights and analysis from new research.
Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security? Christine El Eris of Fiserv discusses fraud trends.
Just by using the term "artificial intelligence," we're already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having? Calvert discusses the proper balance of humans and machines.
In 2016, Retired Brigadier General Francis X. Taylor had a front-row seat to the election interference threat picture. Today, as a leader of U.S. CyberDome, what's his view on how well the U.S. is prepared to protect the 2020 federal election?