Infosecurity News

Samba Exploit Spreads Bitcoin Miners

Samba Exploit Spreads Bitcoin Miners

The exploit incorporates advanced functionality that was barely released in the Metasploit framework a week ago.

89% of Orgs Rely on Basic Security Alone

89% of Orgs Rely on Basic Security Alone

A full 74% of organizations acknowledge they are not well prepared to beat IT risks.

76% of Ransomware Attacks Strike Via Email

76% of Ransomware Attacks Strike Via Email

Phishing – and particularly spear phishing – has become a lucrative art.

Fake News-as-a-Service: Elections Can Be ‘Bought’ For $400K

Fake News-as-a-Service: Elections Can Be ‘Bought’ For $400K

Trend Micro report uncovers the shadowy world of public opinion manipulation

Cloud Services in GDPR Compliance Fail

Cloud Services in GDPR Compliance Fail

Netskope reveals problems with encryption, data sovereignty and more

ICO Fines Gloucester Council £100K After Heartbleed Snafu

ICO Fines Gloucester Council £100K After Heartbleed Snafu

Outsourcer failed to fix problem, resulting in data stealing attack

Spyware- and Ransomware-as-a-Service Target Macs

Spyware- and Ransomware-as-a-Service Target Macs

Both have been purpose-built to appeal to bad actors lacking in technical expertise.

Google Debuts Mobile reCAPTCHA for Android

Google Debuts Mobile reCAPTCHA for Android

The mobile API will use Google’s newest Invisible reCAPTCHA, which runs risk analysis behind the scenes.

Doubleswitch Spreads Disinformation via Verified Social Accounts

Doubleswitch Spreads Disinformation via Verified Social Accounts

The victims don’t just lose control of their social media accounts—in some cases, they never get them back.

Industroyer Malware Detected, Linked to Kiev Attack

Industroyer Malware Detected, Linked to Kiev Attack

Malware which has the ability to take down a city's electrical and power grid has been detected

Virgin Media Patches New Super Hub Bug

Virgin Media Patches New Super Hub Bug

Vulnerability could give hackers full remote access to users’ internet traffic

Half of Third-Party Software Components Are Outdated

Half of Third-Party Software Components Are Outdated

Synopsys report reveals extent of preventable security risks

What’s Hot on Infosecurity Magazine?