US's greatest vulnerability is underestimating adversaries' cyber threats, geopolitics expert says

February 19, 2018

104596000-gettyimages-613181776-ian-bremmer.160x105
America's greatest vulnerability is its continued inability to acknowledge the extent of its adversaries' capabilities when it comes to cyber threats, says Ian Bremmer. View Full Coverage

Iran the most dangerous nation for cyberattacks, says Saudi foreign minister

February 19, 2018

104832014-gettyimages-865039728-adel_al-jubeir.160x105
The most dangerous nation for cyber threats is Iran, Saudi Foreign Minister Adel Al-Jubeir told CNBC on Sunday. View Full Coverage

Learn Ethical Hacking Online — 9 Courses At Lowest Price Ever

February 17, 2018

Learn-ethical-hacking-online
How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but don’t know where to start? This week's THN deal is for you. Today THN Deal Store has announced a new Super-Sized Ethical Hacking Bundle that let you get started your career in hacking and penetration testing regardless of your experience level. The goal of this online training course is to help you master an ethical hacking and penetration testing methodology. This 76 hours of the Super-Sized Ethical Hacking Bundle usually cost $1,080, but you can exclusively get this 9-in-1 online training course for just $43 (after 96% discount) at the THN Deals Store. 96... View Full Coverage

Russia interference should be countered with 'the truth' and not 'more propaganda,' NATO chief says

February 17, 2018

104492522-rtx37lzh-donald-trump-nato.160x105
NATO has to respond in different ways to Russia's interference in other political systems, its secretary general told CNBC Saturday. View Full Coverage

US government is 'exceptionally vulnerable' to cyberattacks, security expert says

February 17, 2018

104469980-rtx35orw.160x105
The United States is "vulnerable" to cybersecurity attacks and need to step up their defense mechanisms, the co-founder of the computer security firm CrowdStrike told CNBC Saturday. View Full Coverage

Cybersecurity is one of our fastest growing elements: Raytheon International CEO   

February 16, 2018

105012258-6ed2-eur-johndharris2-021617.160x105
"The new U.S. administration has given us some clarity, some context with respect to threats," said John D. Harris. View Full Coverage

Hundreds of thousands of malware products designed every day: Raytheon International CEO   

February 16, 2018

105012242-6ed2-eur-johndharris-021617.160x105
John D. Harris speaks about cybersecurity. View Full Coverage

Munich Security Conference to focus on role of EU and relations with Russia   

February 16, 2018

105012260-6ed2-eur-hadleygamble-021617.160x105
CNBC's Hadley Gamble reports from the Munich Security Conference with input from John D. Harris, Raytheon International CEO. View Full Coverage

White House advisor: We saw 'indiscriminate' cyberattack by Russia   

February 16, 2018

104469980-rtx35orw.160x105
CNBC's Hadley Gamble reports on her interview with White House Cybersecurity Coordinator Rob Joyce about accusations that Russia was behind "NotPetya" attack. View Full Coverage

3 Cybersecurity Threats SMB Etailers Should Not Ignore

February 16, 2018

Security-ecommerce
Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. "Very often small businesses don't feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies," said Stephanie Weagle, VP of Corero. View Full Coverage

Kremlin rejects US accusation that Russia is behind 'Notpetya'   

February 16, 2018

105013349-robjoyce-1.160x105
CNBC's Hadley Gamble reports on the White House blaming Russia for the most costly cyberattack and what officials worry about in terms of cybersecurity. View Full Coverage

Indicted Russians used PayPal and cryptocurrency exchange accounts

February 16, 2018

104642518-gettyimages-699394842.160x105
Russians indicted in election interference used false documents to maintain PayPal and cryptocurrency exchange accounts, the indictment said. View Full Coverage

US will impose costs on Russia for cyber ‘acts of aggression,’ White House cybersecurity czar says

February 16, 2018

104751884-_y2a9666.160x105
The malware attack known as NotPetya wiped out billions of dollars as it spread across 64 countries in July 2017. View Full Coverage

UK blames Russia for cyberattack, says won't tolerate disruption

February 15, 2018

104842902-gettyimages-683325068.160x105
Britain publicly pointing the finger at Russia for spreading a virus which disrupted companies across Europe. View Full Coverage

A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac

February 15, 2018

Iphone-crash
Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. First spotted by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of their operating software. Like previous 'text bomb' bug, the new flaw can easily be exploited by anyone, requiring users to send only a single character from Telugu—a native Indian language spoken by about 70 million people in the country. Once the recipient receives a simple message containing the symbol or typed that symbol into the text editor,... View Full Coverage

Sweetheart scammers are on the prowl this Valentine’s Day

February 14, 2018

104673479-gettyimages-489593803-online-dating.160x105
Romance cons are on the rise, now accounting for the highest financial losses of all internet-facilitated crimes, according to the FBI. View Full Coverage

US news site gives readers a choice: Disable your ad blocker or let us mine cryptocurrency

February 14, 2018

105007836-salon_ad_blocker.160x105
Salon is using readers' computing power to mine the virtual currency monero. View Full Coverage

FTC commissioner nominees open to investigating tech companies

February 14, 2018

105008513-gettyimages-918225256.160x105
When asked about the Equifax investigation, the four nominees responded cautiously, but talked tough on investigating breaches. View Full Coverage

Hackers Exploiting 'Bitmessage' Zero-Day to Steal Bitcoin Wallet Keys

February 14, 2018

Bitmessage-bitcoin-hacking
Bitmessage developers have warned of a critical 'remotely executable' zero-day vulnerability in the PyBitmessage application that was being exploited in the wild. Bitmessage is a Peer-to-Peer (P2P) communications protocol used to send encrypted messages to users. Since it is decentralized and trustless communications, one need-not inherently trust any entities like root certificate authorities. Those who unaware, PyBitmessage is the official client for Bitmessage messaging service. According to Bitmessage developers, a critical zero-day remote code execution vulnerability, described as a message encoding flaw, affects PyBitmessage version 0.6.2 for Linux, Mac, and Windows and has been exploited against some of their users. "The exploi... View Full Coverage

Microsoft Won't Patch a Severe Skype Vulnerability Anytime Soon

February 13, 2018

Skype-hacking
A serious vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could potentially allow attackers to gain full control of the host machine by granting system-level privileges to a local, unprivileged user. The worst part is that this vulnerability will not be patched by Microsoft anytime soon. It's not because the flaw is unpatchable, but because fixing the vulnerability requires a significant software rewrite, which indicates that the company will need to issue an all-new version of Skype rather than just a patch. The vulnerability has been discovered and reported to Microsoft by security researcher Stefan Kanthak and resides in Skype's update installer, which is sus... View Full Coverage

South Korea vows firm action against illegal, unfair cryptocurrency trading

February 13, 2018

105006961-gettyimages-893343222.160x105
South Korea will take action against "illegal" and unfair cryptocurrency trading after a petition was sent to the presidential Blue House. View Full Coverage

Microsoft Issues Security Patch Update for 14 New Critical Vulnerabilities

February 13, 2018

Download-microsoft-windows-update-min
Microsoft's Patch Tuesday for this month falls the day before the most romantic day of the year. Yes, it's Valentine's, and the tech giant has released its monthly security update for February 2018, addressing a total of 50 CVE-listed vulnerabilities in its Windows operating system, Microsoft Office, web browsers and other products. Fourteen of the security updates are listed as critical, 34 are rated as important, and 2 of them are rated as moderate in severity. The critical update patches serious security flaws in Edge browser and Outlook client, an RCE in Windows' StructuredQuery component, and several memory corruption bugs in the scripting engines used by Edge and Internet Explorer. Critical Microsoft Outlook Vulnerability One o... View Full Coverage

Leak of Stale iOS Source Code Could Trigger Fresh Problems

February 09, 2018

Code-leak
Apple lawyers have sent a copyright violation notice to Github, following the publication of leaked iOS 9 source code on the site. Though iOS 9 is dated, it's possible that the leaked code could be used to jailbreak older devices or worse. Publication of the code violated Apple's rights under the DMCA, the attorneys wrote, demanding that the iBoot source code be removed. View Full Coverage

WiFi Routers Riddled With Holes: Report

February 06, 2018

Wifi-security
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a new report. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hackers. Insignary conducted comprehensive binary code scans for known security vulnerabilities in WiFi routers. View Full Coverage

Icon-linkedin Icon-twitter Icon-fb Icon-youtube