Tags » CyberSecurity

Adding an extra layer of security to your online accounts is a fundamental step to protect your digital life from hackers, but what’s the point if the new methods are just as vulnerable as the old ones? 19 more words


Linux.MulDrop.14 is a Linux worm that seeks out networked Raspberry Pi systems with default root passwords; after taking them over and ZMap and sshpass, it begins mining an unspecified cryptocurrency, creating riches for the malware’s author and handing you the power-bill. 12 more words


Lack of clarity hinders cybersecurity insurance investment

Despite the increase in data breaches and their costs, many enterprise security professionals say their organizations don’t currently have cybersecurity insurance. But that may be changing. 358 more words


Healthcare industry still concerned about medical device hacking

A Ponemon survey released last week, Medical Device Security: An Industry Under Attack and Unprepared to Defend, shows that many in the healthcare industry still believe medical devices are primed for, and defenseless to, attack. 507 more words


Stay safe: Massive database of stolen passwords surfaces

Every few months, it seems, a big trove of usernames and passwords surfaces somewhere.

This week it was uncovered by Bob Diachenko of Kromtech Security Research Center. 309 more words


Gestor de contraseñas: ¿herramienta segura o vulnerable?

Seamos realistas: las contraseñas no son sólo un incordio, encima ni siquiera logran ser seguras. El ciudadano medio tiene docenas de combinaciones de nombre de usuario y contraseña que debe recordar y muchos llegan a acumular cientos de combinaciones que no utilizan. 555 more words


Logiciels de gestion de mot de passe : outil sécurisé ou point faible ?

Soyons honnêtes: au-delà du fait que se souvenir d’eux est parfois un casse-tête, les mots de passe ne sont pas en soi les verrous les plus efficaces pour protéger nos données. 781 more words