10,000 Microsoft customers targeted by nation-state attacks in the last year

Within 45 days, agencies must appoint a software manager to oversee license and agreement inventories, and begin reporting progress in their license management by Nov. 30.

technology news

FaceApp isn't taking all of your photos, but the privacy concerns are very real

by Shannon Vavra • 1 day ago

From shady fine print to Russian law, FaceApp's geriatric filter may not be worth all the fun.

This firmware flaw was bad enough, but then researchers looked at the supply chain

by Sean Lyngaas • 1 day ago

Lenovo servers had a conspicuous security problem, but specialists at hardware-security company Eclypsium, found that the story was much bigger.

‘StrongPity’ hacking group does just enough to get around defenses

by Sean Lyngaas • 1 day ago

The group is still going after users who download router management software to infect target organizations.

More than 805,000 systems are still exposed to BlueKeep, study finds

by Sean Lyngaas • 2 days ago

Organizations are patching, but not fast enough.

Why the revised NIST mobile security framework looks better from a distance

by cyber_admin • 2 days ago

In this op-ed, Wandera's Michael Covington says what sounds good theoretically can be near impractical to implement.

Fake Telegram app on more than 100,000 phones infected U.S., UAE Androids

by Jeff Stone • 2 days ago

The Android malware pushed fake prizes to generate click fraud. The program’s developers borrowed open-source code from the real Telegram app.

Russia’s Turla group goes trolling with code labeled “TrumpTower”

by Sean Lyngaas • 3 days ago

Kaspersky found that the group also referred to 'Rocket Man,' apparently a reference to Kim Jong Un.

The developers of the notorious FinSpy spyware are innovating — and thriving

by Sean Lyngaas • 1 week ago

Updated FinSpy implants for iOS and Android have been used in nearly 20 countries in the last year, according to Kaspersky.

Zoom flaw could enable hackers to activate Mac webcams without permission

by Sean Lyngaas • 1 week ago

The security issues speak to the risk associated with default settings on popular applications that a user might overlook.

From exploits to honeypots: How the security community is preparing for BlueKeep’s moment of truth

by Sean Lyngaas • 1 week ago

“Every CISO right now should have a plan already written down to deal with BlueKeep once the exploit starts surfacing."

TwitterFacebookLinkedInRedditGoogle Gmail