Blog: In The News
You are here: Home \ Blog
Researchers are warning malware payloads can bypass traditional AV protection when delivered buried inside images, documents or even just a pixel.
Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims’ devices.
Researchers have identified a hacking group behind several widescale maritime shipping industry business email compromise (BEC) attacks since June.
Researcher Billy Rios, founder of WhiteScope, discusses medical device hacking at RSA Conference 2018 with Threatpost’s Tom Spring.
Threatpost talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about the U.S. government’s current position on device encryption and law enforcement’s use of iPhone passcode cracker called GreyKey.
Mobile apps leak personal data via insecure ads that transmit ad-targeting data insecurely.
Microsoft president Brad Smith at RSAC 2018 said more than 30 companies will oppose government cyberattacks on “innocent civilians.”
Cryptomining malware is the top threat to watch out for 2018, according to a Q1 analysis of threats.
The use of automated bots is becoming more prevalent for novice attackers as tools become more available, researchers found.
Threatpost’s Tom Spring and Lindsey O’Donnell talk about the top security trends that they are watching out for at the 2018 RSA Conference this week in San Francisco.
... 404142434445464748 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...