Analysis

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems.

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

Darknet market bundling card details with device fingerprints to beat fraud detection

Researchers have uncovered an invitation-only Tor-concealed marketplace where stolen credit card details are bundled with the victim's device fingerprint, meaning criminal buyers can use them to beat numerous fraud detection systems.

Nine out of ten critical infra establishments hit by cyber attacks: Ponemon

Security professionals in critical infra sectors across six countries revealed that 90 percent of them were hit by a cyber attack at some point in time, according to Ponemon Institute's latest research. We take a look at some of the most infamous ones.

What is Bitdefender VPN?

Bitdefender is highly rated for its antivirus packages, and now they come with a built-in VPN service. Buy Antivirus Plus, Internet Security or Total Security and you’ll find the option to use the new VPN service in the interface.

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

Cyber criminals increasingly favouring 'low and slow' stealth attacks

A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.

Are cybersecurity gender diversity programs losing steam?

Cybersecurity has long been a male dominated field. According to an ISACA survey, 89 per cent of respondents said there were more men than women in cyber roles in their companies. Some 15 percent of the 1,500 ISACA certified respondents said they worked in organisations where the entire security function was male.

Password managers remain an important security tool despite new vulnerability report

Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists

The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.

ICANN housecleaning will revoke old DNS security key this week

ICANN will complete the switchover this week to a new internet security key that protects DNS, the internet's address book. The old Root Key Signing Key will be decomissioned Jan. 10.