Security Bytes
Information security threats
-
Cyber attribution: Why it won't be easy to stop the blame game
- Associate Editorial Director 29 Jun 2018 -
Cybersecurity pervasiveness subsumes all security concerns
- Senior Reporter 03 May 2018 -
CrowdStrike unveils Meltdown exploit in unusual fashion
- Associate Editorial Director 19 Apr 2018
Infosec experts have argued that too much focus is put on cyber attribution, but moving away from publicly identifying threat groups and nation-states may be easier said than done.
Given the increased digitization of society and explosion of devices generating data (including retail, social media, search, mobile, and the internet of things), it seems like it might have been ...
At RSA Conference 2018, CrowdStrike demonstrated a new Meltdown exploit that can harvest sensitive data such as passwords even on systems that are patched.
-
Intel keynote misses the mark on Meltdown and Spectre vulnerabilities
- Associate Editorial Director 09 Jan 2018 -
The Equation Group malware mystery: Kaspersky offers an explanation
- Associate Editorial Director 31 Oct 2017 -
Latest Kaspersky controversy brings new questions, few answers
- Associate Editorial Director 20 Oct 2017 -
Christopher Young: Don't sleep on the Mirai botnet
- Associate Editorial Director 15 Feb 2017 -
Android malware delivery is harder than you might think
- Senior Reporter 26 Oct 2016 -
Vulnerability branding becomes another marketing tool
- Senior Reporter 08 Apr 2016 -
Why Hillary can't mail
- Editorial Director 04 Mar 2015
With CEO Brian Krzanich's keynote at the 2018 Consumer Electronics Show, Intel missed an opportunity for the Meltdown and Spectre vulnerabilities.
Kaspersky Lab finally explained how it came to possess Equation Group malware, but does the company's latest statement answer enough questions about the ongoing drama?
The Kaspersky controversy continued this week as the antivirus company responded to several explosive news stories about its relationship with the Russian government.
RSA Conference 2017 was full of talk about future IoT attacks, but Intel Security's Christopher Young said the Mirai botnet is still an enormous threat and demonstrated why that is.
Headlines about Android malware often gloss over just how difficult the process is for a user to install a malicious app on a device. Let's talk about that.
Vulnerability branding was once a practice that elevated understanding of flaws and potentially led to better remediation, but now serves as little more than marketing for security researchers.
Reporting by The New York Times notwithstanding, it appears to this non-lawyer that Hillary Clinton probably didn't break any laws by using a personal email account to conduct state business. But ...
-
Yahoo fixes flaw that led to password breach
- Editor 13 Jul 2012 -
Putting the mobile botnet threat in perspective
- TechTarget 28 Jun 2012 -
Operation High Roller: Server-side automation in online bank fraud
- Editor 27 Jun 2012 -
Spam filter gets better of Microsoft SDL—almost
- TechTarget 24 Apr 2012 -
ISP’s anti-botnet code of conduct does little for botnet prevention
- TechTarget 26 Mar 2012
Well it could have been worse. Yahoo on Friday said it has fixed the vulnerability that allowed hackers to expose approximately 450,000 email addresses and passwords belonging to the Yahoo ...
Mobile device security threats are taking center stage as IT managers strive to protect and control these nimble creatures that contain company information and access the company network. But ...
I’ve covered a lot on online bank fraud in the past – there seems to be no end to the increasingly sneaky techniques cybercriminals develop to siphon money out of victims’ bank accounts. This week, ...
Two program managers from the Microsoft Security Response Center shared a tale last week at SOURCE Boston of how a serious vulnerability reported to the MSRC fell into a spam filter and caused an ...
The country’s major ISPs signed on to the U.S. Anti-Bot Code of Conduct for Internet Service Providers, which does little for botnet prevention and removal by stopping short of demanding ISPs ...