via www.infosecurity-magazine.com FEC Votes to Use Campaign Funds for CybersecurityThe Federal Election Committee (FEC) has voted that lawmakers are allowed to use leftover campaign funds to guard personal email accounts and devices from cyber threats….Continue Reading
This Week in Security News: Security Predictions and Malware Attacks.
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span …Continue Reading
A malware family known as CARROTBAT is currently supporting at least 12 unique decoy documents to reel in unsuspecting users. Palo Alto Networks’ Unit 42 threat research team came across CARROTBAT back in 2017 while investigating a cyberattack against …Continue Reading
via www.infosecurity-magazine.com Cyber-Criminal Gets 20 Months After Using Home-Made Fraud DeviceA convicted cyber-criminal once dubbed “the acid house king” has been sentenced to 20 months behind bars for a new fraud campaign which saw him use a biza…Continue Reading
via www.infosecurity-magazine.com ICO Slaps 200K Fine on Nuisance Text BizThe Information Commissioner’s Office (ICO) has fined a London-based company 200,000 for sending millions of nuisance texts to unsuspecting consumers.Tax Return Limited sent a st…Continue Reading
The year 2018 is stacking up to be the year of cybercrime prosecution, with the U.S. Department of Justice (DoJ) flexing its muscle and truly demonstrating the “long arm of the law.” The number of indictments, extraditions, trials and convictions give …Continue Reading
), a global leader in cybersecurity solutions, today released its 2019 predictions report, warning that attackers will increase the effectiveness of proven attack methods by adding more sophisticated elements to take advantage of the changing technolog…Continue Reading
Shamoon disk wiper attack on Saipem signals new affront against energy sector, Middle Eastern interests.
The malware used to disrupt the global operations of Italian energy contractor Saipem S.p.A. earlier this week was none other than Shamoon, a disk…Continue Reading
Either way, the crypto mining code then works in the background as unsuspecting victims use their computers normally. The only sign they might notice is slower performance or lags in execution. Why cryptojacking is on the rise. No one knows for certain…Continue Reading
Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Ha…Continue Reading