An Apple Leak, a Cybercrime Forum Takedown, and More Security News This Week

Credit to Author: Andy Greenberg| Date: Sat, 10 Feb 2018 14:00:00 +0000
An Apple leak, a massive cybercrime forum, and more of the week’s top security news.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Andy Greenberg| Date: Sat, 10 Feb 2018 14:00:00 +0000
An Apple leak, a massive cybercrime forum, and more of the week’s top security news.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 09 Feb 2018 19:18:02 +0000
The first primary for the 2018 midterm elections takes place March 6—and many states are still woefully underprepared.
Read More
Credit to Author: Andy Greenberg| Date: Fri, 09 Feb 2018 12:00:00 +0000
Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.
Read MoreCredit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 09 Feb 2018 16:55:38 +0000
It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to given the international focus, controversy around the ban of certain athletes and its proximity to a certain country. So…

Credit to Author: Lucas Mearian| Date: Fri, 09 Feb 2018 03:11:00 -0800
Last year’s blockchain pilot projects are rapidly becoming this year’s live implementations in a variety of industries, and even sectors that have until now been vexed by the distributed ledger technology are following suit.
Case in point: Governments, which are moving to regulate blockchain technology and the cryptocurrencies it underpins.
Cryptocurrencies such as bitcoin that live in open networks, have so far inhabited a regulatory gray area, because there’s no way for a central authority to track users. The distributed ledgers, however, are useful because they can enable cross-border transactions over peer-to-peer networks in real time, anywhere in the world – without a central governing authority such as a bank or credit card company.
Credit to Author: Greg Young| Date: Thu, 08 Feb 2018 17:59:01 +0000
Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile devices proliferated and they were assembled into a collective of being in the category of not-a-server. But as practitioners know, it isn’t…

Credit to Author: Andy Greenberg| Date: Wed, 07 Feb 2018 22:15:23 +0000
Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 07 Feb 2018 21:21:20 +0000
A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it’s spreading.
Read More