News
Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. The post Encore Podcast: Chris...

Read more
Infosec
Watch out for these scams targeting Amazon customers

Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on. The post Watch out for these scams targeting Amazon customers appeared first on WeLiveSecurity

Read more
News
As Mobile Fraud Rises, The Password Persists

A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password. The post As Mobile Fraud Rises, The Password Persists...

Read more
News
CISA Issues Alert on Top Exploited Vulnerabilities

On July 28, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) issued a cybersecurity alert entitled “Top Routinely Exploited Vulnerabilities” in collaboration with the Australian Cyber Security Centre, the United Kingdom’s...

Read more
Infosec
Cybersecurity agencies reveal most exploited vulnerabilities in the past two years

There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet The post Cybersecurity agencies reveal most exploited vulnerabilities in the past two years appeared first on WeLiveSecurity

Read more
News
Apple Issues Patches: Apply Them Now and Alert Your Employees to Do the Same

Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple,...

Read more
News
Proposal for National Transportation Safety Board to Investigate Drone Accidents

Today, the National Transportation Safety Board (NTSB) investigates accidents involving manned aircraft and other major transportation accidents. However, there was a new Notice of Proposed Rule Making (NPRM) released by the...

Read more
Infosec
Tackling the insider threat to the new hybrid workplace

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose The post Tackling the insider threat to the new hybrid workplace appeared first on WeLiveSecurity

Read more
Infosec
Most Twitter users haven’t enabled 2FA yet, report reveals

Twitter’s transparency report revealed that users aren’t quick to adopt 2FA and once they do enable it, they choose the least secure option The post Most Twitter users haven’t enabled 2FA yet, report reveals appeared first on WeLiveSecurity

Read more
Dark
8 Security Tools to be Unveiled at Black Hat USA

Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more. ...

Read more