The four extensions, two from Avast and two from AVG, are still available on the Chrome Web Store.
The report exposes privacy issues and tracking techniques in online services we use on a daily basis.
Phishing and DDoS attacks are up, Microsoft security stats reveal.
Novelty may have a hidden, nefarious purpose, the FBI has cautioned.
The New Yorker has published the long and interesting story of the cybersecurity firm Tiversa. Watching "60 Minutes," Boback saw a remarkable new business angle. Here was a multibillion-dollar industry with a near-existential problem and no clear solution. He did not know it then, but, as he turned the opportunity over in his mind, he was setting in motion a...
ZDNet goes over the list of biggest malware botnets of the past decade, from Necurs to Mirai.
Promon discovers new StrandHogg vulnerability. Lookout identifies 36 malicious apps exploiting it in the wild.
Updated: Privilege escalation and code execution bugs lurked in the applications.
New South Wales is implementing a camera system that automatically detects when a driver is using a mobile phone....
Chrome OS is the second most targeted, while Linux is the least.
Emails, usernames, and strong-hashed passwords sold for $2,000.
The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Security.plist was inspired by the already-existing and highly popular security.txt standard.
Europol reports 14 arrests across eight countries, including the RAT's creator, in Australia.
Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time. In this work, we show that these training-time vulnerabilities extend to deep reinforcement learning (DRL) agents and can be exploited by an adversary with access to the training...
ZDNet takes a look over the most important data breaches, cyber-attacks, and malware strains of the last decade.
The hospitality industry can’t catch a break when it comes to cybercrime.
The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems have a mechanism for reporting them to someone who might actually do something about it. The devil is in the details, of course, but this is a welcome development. The DHS is seeking public feedback....
Security breach was detected last week and traced back to a vulnerability in the Magento Marketplace website.
Texas man stole more than 50 GBs of music and then published unreleased songs on public internet forums.