Mobile malware masked as porn apps
Credit to Author: Anna Markovskaya| Date: Thu, 08 Feb 2018 14:14:36 +0000
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Anna Markovskaya| Date: Thu, 08 Feb 2018 14:14:36 +0000
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Read MoreCredit to Author: Amar Patil| Date: Thu, 08 Feb 2018 06:53:36 +0000
In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb…
Read MoreCredit to Author: Amar Patil| Date: Thu, 08 Feb 2018 06:53:36 +0000
In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb…
Read More
Credit to Author: Andy Greenberg| Date: Wed, 07 Feb 2018 13:06:53 +0000
Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.
Read More
Credit to Author: Garrett M. Graff| Date: Mon, 05 Feb 2018 22:54:06 +0000
We speak about the “Mueller probe” as a single entity, but it’s important to understand that there are no fewer than five separate investigations under the broad umbrella of the special counsel’s office.
Read More![]()
What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

Credit to Author: Dave Taylor| Date: Tue, 06 Feb 2018 03:31:00 -0800
Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations center. They of course use firewalls and antivirus tools. They probably spend a lot of time monitoring their networks, looking for telltale anomalies that could indicate a breach. What with IDS, SIEM and NGFWs, they deploy a veritable alphabet of defenses.
But how many have given much thought to one of the cornerstones of their digital operations: the operating systems deployed on the workforce’s PCs? Was security even a factor when the desktop OS was selected?
This raises a question that every IT person should be able to answer: Which operating system is the most secure for general deployment?

Credit to Author: Lucas Mearian| Date: Mon, 05 Feb 2018 12:55:00 -0800
Apple’s Health Records feature in the upcoming iOS 11.3 rollout may be the most high-profile attempt at sharing healthcare data between caregiver and patient, but it won’t succeed without industry’s cooperation.
What is new is the mass market Apple commands with its iPhone and iPad and the company’s efforts to take advantage of new industry standards and collaborative alliances for aggregating and sharing patient data from disparate healthcare systems.
Even with all the electrification of healthcare data and advances in networks for sharing that data, however, one industry stalwart is unlikely to be replaced: the fax.