How to Reduce the Risk of a DNS Attack

Domain Name System or DNS is one of the foundational elements of the entire internet; however, unless you specialize in networking, you probably don’t realize how important it is. DNS...

Pwn2Own 2019 – Ethical Hackers Earned $240,000 for Zero-day

Trend Micro’s Zero Day Initiative (ZDI) vulnerability research contest Pwn2Own 2019 Successfully started its first-day contest and the team of researchers earned $240,000 in the first day alone for the...

Windows 7 is Expiring Soon

You might be wondering who would be using Windows 7? Windows 7 added user share for the second straight month in March 2019, gaining a whopping 1.2 percentage points to rebound...

A predatory tale: Who’s afraid of the thief?

In mid-February, Kaspersky Lab received a request for incident response from one of its clients. The individual who initially reported the issue to our client refused to disclose the origin...

Kaspersky Lab Files Antitrust Case Against Apple

Kaspersky Lab has filed an antitrust complaint against Apple in Russia, arguing that the tech giant forced it to remove two key features from one of its apps just as...

The Document that Microsoft Eluded AppLocker and AMSISecurity Affairs

Experts analyzed an Office document containing a payload that is able to bypass Microsoft AppLocker and Anti-Malware Scan Interface (AMSI), Introduction Few days...

Ransomware Activity Declines, But Remains Dangerous Threat

One of the most visible attacks associated with SamSam hit the city of Atlanta on March 22, 2018. With multiple municipal computers encrypted by the ransomware, more than one-third of...

Does GDPR compliance reduce breach risk?

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides a benefit. A report by EY and the International Association...

Why real-time intelligence matters for managing third-party risk

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! As leading companies in every industry today are...

Google Online Security Blog: Open-sourcing Sandboxed API

When a software library parsing such data is sufficiently complex, it might fall victim to certain types of security vulnerabilities: memory corruption bugs or certain other types of problems related...

LATEST NEWS

MUST READ