A long-running ad fraud campaign that was using more than 500 malicious Google Chrome extensions has been identified and halted by researchers.
Starting in March 2020, all the major web browsers—Firefox, Chrome, Safari, and Edge—will display warnings when users visit websites that only support Transport Layer Security (TLS) versions 1.0 or 1.1. Users will be unable to visit those sites.
Riana Pfefferkorn of the Center for Internet and Society at Stanford University joins Dennis Fisher to discuss encryption, privacy, and the draft of the EARN IT Act.
The FBI IC3 Internet Crime Report shows more than $1.7 billion in looses from BEC scams, far more than from any other kind of cybercrime activity it tracks.
Google has patched a critical Bluetooth flaw in Android that could give an attacker control of a vulnerable device without any user interaction.
The Department of Justice indicted four members of China's People's Liberation Army in connection with the Equifax data breach in 2017.
An attack campaign has targeted financial services using a new type of backdoor since early January, FireEye said.
Cisco has patched five serious vulnerabilities that affect routers, switches, and IP phones and cameras with the Cisco Discovery Protocol enabled.
Web shell attacks have been on the rise in recent months, as many APT groups employ them against enterprises.
While FCC chairman Ajit Pai said at least one wireless carrier sold location data in violation of federal law, it is far from clear whether the offending entity will face any penalties.
A flaw in the sudo utility could allow a local user to gain root privileges if the pwfeedback option is enabled.
A proposal that would standardize the format of SMS messages being used in two-factor authentication schemes has a simple goal: make users relying on those one-time passcodes less susceptible to phishing attacks.
A proposed bill by Sen. Lindsey Graham to prevent online child exploitation imagery could have a disastrous effect on end-to-end encryption.
Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and access to information, researchers said.
Disinformation campaigns and cyber operations are intersecting more and more often, as actors become more sophisticated in their use of both tactics in their operations.