What does dumping toxic waste in the the Chicago River and paying cyber extortionist have in common? Quite a lot, actually. Risk management expert Tony Martin-Vegue looks at the factors that drive the decision to pay or not pay the ransom after an attack.
Google has added some new protections designed to help users detect or recover from account compromises.
In this Straight Talk with Real CISOs video for Decipher, Wendy Nather (director of Advisory CISOs at Duo), Chad Loder (CEO and co-founder of Habitu8), and Manju Mude ("Paranoid" Security Leader at Oath) discuss how CISOs have to establish relationships within their organization to be able to
Netflix has released a desktop version of its open source Stethoscope security health check tool, which provides detailed information on how to fix security issues on a device.
Google's new reCAPTCHA v3 system uses a risk analysis system to build a score of how suspicious a user's traffic is.
A wave of attacks is using exposed Docker APIs to install cryptomining malware on compromised hosts.
The Food and Drug Administration outlines what manufacturers have to do to develop secure medical devices on the draft of its premarket guidance. The FDA laid out recommendations on what information to provide when submitting the devices for premarket approval.
A vulnerability in the X.org X Server software allows an authenticated attacker to gain root privileges and the ability to overwrite any files on a target system.
Apple CEO Tim Cook said the collection of user information has led to a "data industrial complex" and called for a national privacy law.
The WordPress security team has a tough job: regularly fixing security issues found in the most popular CMS while providing users with the tools to make sure they aren't running older vulnerable code.
A new report from CyberX study shows that industrial control systems and industrial internet of things continue to struggle with devices being connected to the internet and legacy protocols exposing passwords.
Reshippers and drop networks have become a key part of the global cybercrime economy.
The original vulnerability may be in a jQuery plugin, but the disconnect in how web developers use .htaccess with the Apache web server and how the server is actually configured means there are potentially more applications out there that are vulnerable to attack.
A researcher has found three flaws in some D-Link wireless routers that can allow an attacker full control of an affected device.
Android has long been viewed as the less-secure mobile operating system compared to iOS, and Google's licensing changes to comply with the European Commission's anti-trust ruling can potentially make the ecosystem's overall security situation worse.