A US Election Phishing Attack, Quitting Vaping, and More News

Credit to Author: Alex Baker-Whitcomb| Date: Fri, 04 Oct 2019 22:23:11 +0000
Catch up on the most important news from today in two minutes or less.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Alex Baker-Whitcomb| Date: Fri, 04 Oct 2019 22:23:11 +0000
Catch up on the most important news from today in two minutes or less.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 04 Oct 2019 19:33:21 +0000
A revelation from Microsoft offers a chilling reminder that Russia is not the only country interested in swaying the 2020 election.
Read MoreCredit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 04 Oct 2019 17:33:56 +0000

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust. I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…
The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on .
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 03 Oct 2019 22:40:50 +0000
Attorney general William Barr seems eager to reignite the encryption wars, starting with the social media giant.
Read MoreCredit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 04 Oct 2019 16:17:47 +0000

Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices. It might leave CISOs with a lot of questions about how this newer, growing attack vector could impact their business. We hope to answer…
The post Answering IoT Security Questions for CISOs appeared first on .
Read More
Credit to Author: Sally Adam| Date: Fri, 04 Oct 2019 16:05:36 +0000
To understand how to stop Ryuk ransomware we look at how the attacks unfold.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ZjaJQGFRg2A” height=”1″ width=”1″ alt=””/>
Read More
Credit to Author: Anastasiya Gridasova| Date: Fri, 04 Oct 2019 14:20:36 +0000
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
Read MoreCredit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 Oct 2019 13:05:54 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how smart home devices can be easily hacked and 11 vulnerabilities that could affect medical devices and hospital networks. Also, read about why AI could…
The post This Week in Security News: How a GIF Can Hack Your Android and Vulnerabilities That Could Put Hospital Networks at Risk appeared first on .
Read More