Category: Accent

‘Your account has been locked’ – 7 telltale signs of a phishing scam

Posted on 18th June 2019

Post by Filip Truta, Hot For Security According to study after study, phishing remains the most efficient attack vector for bad actors to steal your data. Even though attackers have plenty of options, they prefer phishing because...

Read more

Don’t have your account hijacked. Secure your online accounts with more than a password, says Google

Posted on 16th June 2019

Post by Graham Cluley, Hot For Security Research published at the end of last week argues that the typical user can significantly harden the security of their online accounts by linking a recovery phone number that can send an alert if...

Read more

Hackers Breach Stack Overflow Q&A Site, Some Users’ Data Exposed

Posted on 11th June 2019

Published by Swati Khandelwal, The Hacker News

Stack Overflow, one of the largest question and answer site for programmers, revealed today that unknown hackers managed to exploit a bug in its development tier and then...

Read more

How We Collectively Can Improve Cyber Resilience

Posted on 9th June 2019

Post by Todd Weller, Dark Reading

Three steps you can take, based on Department of Homeland Security priorities.

At the 2019 RSA Conference earlier this year, Chris Krebs, director of the Department...

Read more

Website Attack Attempts Rose by 69% in 2018

Posted on 4th June 2019

Post by Curtis Franklin Jr, DarkReading

Millions of websites have been compromised, but the most likely malware isn't cyptomining: it's quietly stealing files and redirecting traffic, a new Sitelock report shows.


Read more

Microsoft worm warning: Windows users urged to patch now

Posted on 2nd June 2019

Post by Graham Cluley, HotForSecurity Microsoft is urging computer users to patch their systems now against a critical vulnerability that could be exploited by a fast-moving worm. The vulnerability (CVE-2019-0708) is in Remote...

Read more

The Data Problem in Security

Posted on 28th May 2019

Article by Julian Waits, DarkReading

CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.

Today's CIOs are the stewards of company data, responsible...

Read more

P2P Weakness Exposes Millions of IoT Devices

Posted on 26th May 2019

A map showing the distribution of some 2 million iLinkP2P-enabled devices that are vulnerable to eavesdropping, password theft and possibly remote compromise, according to new research.

Post by Brian Krebs, KrebsonSecurity


Read more

The Internet knows your every move – this is why you should care

Posted on 24th May 2019

Post by Filip Truta, Hot For Security In today’s digital economy, every company wants your data – from things like your email address and credit card number, right down to your deepest desires. And you willingly hand over this data on...

Read more

Hacked AV companies named in ‘code for sale’ breach

Posted on 21st May 2019

Article by Bardley Barth, SC Media

McAfee, Symantec and Trend Micro are reportedly the anti-virus companies whose source code the cyber-criminal group Fxmsp claims to have stolen. Comments issued by the vendors minimised the threat,...

Read more

Join our Newsletter

Get updates and the latest scoop in your inbox