Scams and flaws: Why we get duped
Scams and flaws

What are the emotional triggers and errors in judgment that make you fall for an online scam? Con artists have been plying their trade since time immemorial, but the internet opened the floodgates to a whole new level of swindling. It has allowed fraudsters to take aim at an endless number of victims and at […]

Read more
Introducing Opus 1.3
Opus 1

The Opus Audio Codec gets another major update with the release of version 1.3 (demo). Opus is a totally open, royalty-free audio codec that can be used for all audio applications, from music streaming and storage to high-quality video-conferencing and VoIP. Six years after its standardization by the IETF, Opus is now included in all […]

Read more
Tumblr patches bug that could have exposed user data
Tumblr

The microblogging platform is assuring its users that has found no evidence that any data was actually stolen Tumblr has fixed a vulnerability that it says could have exposed private user data, according to an announcement by the microblogging and social networking site. The information that could have been viewed by unauthorized parties includes email […]

Read more
VestaCP compromised in a new supply-chain attack
VestaCP compromised in a new supply-chain attack

Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS In recent months, numerous users of VestaCP, a hosting control panel solution, have received warnings from their service providers that their servers were using an abnormal amount of bandwidth. We know now that these servers were in fact used to launch DDoS attacks. Analysis […]

Read more
GreyEnergy: Updated arsenal of one of the most dangerous threat actors
BlackEnergy vs GreyEnergy security chart

ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time […]

Read more
Phishers are after something unusual in ploy targeting book publishers
Old bookshelf

In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things Several global book publishing houses and an international literary scouting agency have warned their staff of a flurry of phishing emails that seek authors’ and publishers’ sensitive information, including book manuscripts, The Bookseller reports. Penguin Random […]

Read more
Supply Chain Security 101: An Expert’s View
Supply Chain Security 101: An Expert’s View

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We talked at length about many issues, including supply chain security, and I asked Sager whether he’d […]

Read more
Top