Cybersecurity News

Threatpost | The first stop for security news

The First Stop For Security News

Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.
Author: Lindsey O'Donnell
Posted: February 22, 2019, 9:29 pm
There was a shocking turn of events in crypto-world.
Author: Tara Seals
Posted: February 22, 2019, 9:23 pm
Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.
Author: Lindsey O'Donnell
Posted: February 22, 2019, 6:53 pm
U.S. and subcontinent consumers were the most affected by this week's exposure revelations.
Author: Tara Seals
Posted: February 22, 2019, 6:32 pm
From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.
Author: Lindsey O'Donnell
Posted: February 22, 2019, 5:21 pm
Weigh in on password managers with our Threatpost poll.
Author: Tara Seals
Posted: February 22, 2019, 12:11 pm
Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.
Author: Tara Seals
Posted: February 21, 2019, 7:01 pm
Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.
Author: Lindsey O'Donnell
Posted: February 21, 2019, 5:05 pm
Admins should update immediately to fix a remote code-execution vulnerability.
Author: Tara Seals
Posted: February 21, 2019, 3:54 pm
Users of the popular file-compression tool are urged to immediately update after a serious code-execution flaw was found in WinRAR.
Author: Lindsey O'Donnell
Posted: February 21, 2019, 3:05 pm

security – Ars Technica

Serving the Technologist for more than a decade. IT news, reviews, and analysis.

Researchers also devise a Spectre-like attack with no known mitigation.
Author: Peter Bright
Posted: February 23, 2019, 5:30 pm
Microsoft is phasing out SHA-1 hashes on its patches.
Author: Peter Bright
Posted: February 19, 2019, 5:10 pm
Processor protects malware from attempts to inspect and analyze it.
Author: Peter Bright
Posted: February 12, 2019, 8:54 pm
Three years of updates will be available.
Author: Peter Bright
Posted: February 6, 2019, 9:31 pm
The update is still rolling out at a snail's pace.
Author: Peter Bright
Posted: January 17, 2019, 6:38 pm
Up to three years of paid support will be available after the cut-off.
Author: Peter Bright
Posted: January 14, 2019, 6:50 pm
Though as ever, Home users are special.
Author: Peter Bright
Posted: January 4, 2019, 9:43 pm
Researcher Ashkan Soltani will discuss what happens when companies sell your data.
Author: Annalee Newitz
Posted: January 3, 2019, 6:08 pm
Plug-and-play hardware lacks even basic functional security for crucial bootrom.
Author: Kyle Orland
Posted: December 10, 2018, 5:03 pm
Motivations of hackers are unclear, but proprietary Wi-Fi may have been a target.
Author: Megan Geuss
Posted: November 30, 2018, 6:32 pm
Two patches pulled altogether; another is known to cause crashes but should be used anyway.
Author: Peter Bright
Posted: November 20, 2018, 5:19 pm
Systematic analysis reveals a range of new issues and a need for new mitigations.
Author: Peter Bright
Posted: November 14, 2018, 1:50 am
Microsoft is opening up about some of its testing procedures, too.
Author: Peter Bright
Posted: November 13, 2018, 6:21 pm
And on GitHub there's a proof-of-concept that'll render your system unbootable.
Author: Peter Bright
Posted: October 24, 2018, 3:50 pm
Former Facebook CSO Alex Stamos tells us what he learned in 2016 and what comes next.
Author: Annalee Newitz
Posted: October 24, 2018, 1:10 pm
Fee-based service couples the security of a private server with the reliability of the cloud.
Author: Dan Goodin
Posted: October 17, 2018, 5:52 pm
Almost everyone has now migrated to TLS 1.2, and a few have moved to TLS 1.3.
Author: Peter Bright
Posted: October 16, 2018, 10:00 pm
Facebook's focus on misinformation is leaving an opening for another type of scam.
Author: Dan Goodin
Posted: October 16, 2018, 12:42 am
"Our internal investigations directly contradict every consequential assertion."
Author: Timothy B. Lee
Posted: October 8, 2018, 6:25 pm
Super Micro, Amazon, and Apple deny everything in the report.
Author: Peter Bright
Posted: October 4, 2018, 4:08 pm
Updated: May 30, 2018 — 6:56 pm

The Author

Rich Fleetwood

Rich is the founder of SurvivalRing, now in it's 20th year, author of multimedia CDs and DVDs, loves the outdoors, his family, his geeky skill-set, and lives in rural Missouri, just a few miles from the Big Muddy. Always ready to help others, he shares what he learns on multiple blogs, social sites, and more. With a background in preparedness and survival skills, training with county, state, and national organizations, and skills in all areas of media and on air experience in live radio and television, Rich is always thinking about the "big picture", when it comes to helping individuals and families prepare for life's little surprises. Since 1997, he has provided guidance, authentic government survival history, and commentary on why we all need to get ready for that fateful day in the future, when we have to get our hands dirty and step in to save the day. He is an award winning videographer (2005 Telly Award), has received state and national scholarly recognition (2006 New Century Scholar and All USA Academic Team), and is a natural with computers, technology, gadgets, small furry mammals, and anything on wheels. Rich likes making friends, solving problems, and creating solutions to everyday issues. He doesn't mind mixing things up, when there is a teaching moment ready to happen. As a constitutional conservative, he's staying quite busy these days. The SurvivalRing Radio Show at www.survivalringradio.com will be coming back SOON!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.