Cloudflare has been working with the likes of Google, Mozilla, Fastly and Apple to make it harder for ISPs and other network operators from being able to see what sites users are visiting. Cloudflare has rolled out ESNI on its systems to see how well the experimental technical specification works to hide user activity online.
The privacy questions raised by Google's recent changes in how Chrome handles user login, but that doesn't necessarily mean the changes are nefarious.
The Firefox Monitor service uses data from the Have I Been Pwned database to alert people to compromises.
Armchair risk analysis frequently defaults to "patch all the things," but the data shows that trying to chase after every vulnerability isn't always the best strategy for a CISO. How should CISOs look at Kenna Security and Cyentia Institute's research on what kind of patching model works best?
Adoption and support for two-factor authentication continues to expand, as Yubico and Microsoft introduce new products designed to make passwords a thing of the past.
The list of Magecart victims gets longer as the attack group optimizes its attack code and modifies its methods to steal payment card information from unsuspecting shoppers. What's a website owner to do?
Cybercrime gangs are still making hay with ransomware, but a new report from Europol shows that malicious cryptomining is gaining momentum.
A Business Email Compromise (BEC) scam is a type of financial fraud designed to steal money from businesses and individuals. If the email from the CEO says to transfer money ASAP, it's time to call IT, not the bank.
Sen. Ron Wyden says foreign hackers are targeting the personal accounts of senators and is introducing legislation to help protect those accounts.
A year after the massive data breach rocked Equifax, there has been some incremental changes: new state regulations and a federal law for credit freezes. What more needs to happen to get significant improvements in data security and digital privacy?
For many criminals, the fact that they can just buy remote desktop protocol (RDP) credentials means they don’t need to spend the time trying to develop their own attacks. With RDP, the network is their oyster.
Facebook is expanding its bug bounty program to third-party apps and websites that might expose user tokens improperly.
Cloudflare has released a gateway and browser extension to make the distributed IPFS network easily and securely accessible.
F-Secure researchers found that modifying the hardware on modern computers make them susceptible to “cold boot” attacks where passwords and encryption keys can be harvested from memory. Hibernate or power off. Don't put the computer in sleep mode.
Five lawmakers have asked the Secretary of State for answers about his agency's failure to implement MFA despite a federal requirement to do so.