The FBI estimates that BEC scams have cost victims nearly $13 billion in the last year and a half, a major increase that shows no signs of being an anomaly.
Why are attackers interested in compromising the Internet of Things? In this Decipher video, security experts discuss what attackers are looking for when they go after Internet-connected doorbells and other smart devices.
Bundles of personal data records are referred to as "fullz" on the underground marketplaces by criminals. The data can include names, addresses, phone numbers, social security numbers (SSNs) and date of birth, all of which can be used for medical fraud, impersonation or even extortion. Stolen healthcare information is valued the highest.
Chrome now includes a new feature called Site Isolation that can help defend against speculative execution attacks in the browser.
"If it bleeds, it leads..." We have a perverse fascination with autonomous vehicles, especially when they fail, and even more so when there is a fatality.
In its latest release of iOS, Apple has included a new feature called Restricted Mode that can prevent USB-based attacks.
A case before the Illinois Supreme Court is looking like a key test of how companies are allowed to collect and use consumers' biometric information.
For organizations worried about phishing attacks and the prospect of losing control over their files the checklist from the Democratic National Committee is a good starting point to improve baseline security practices.
The CA Security Council's London Protocol attempts to address the problem of phishing sites with legitimate SSL/TLS certificates, but the initiative perpetuates the myth that the pricier EV certificates are more secure than DV certificates.
Facebook said in a long response to lawmakers that it had so-called integration partnerships with 52 companies, but it has ended most of them already.
The new privacy bill in California allows consumers to control what data companies collect from them and how that information is used.
A new data privacy act would allow consumers to stop companies from selling their personal data.
Security veteran Chenxi Wang's new venture capital fund Rain Capital plans to focus on cloud-native security services and products. Rain Capital will also seek out female and minority founders solving challenging security problems.
Twitter now supports the use of hardware security keys for two-factor authentication, a much stronger option for users.
WPA3 brings new security features to wireless networks, including better password security.