Home Search
phishing - search results
If you're not happy with the results, please do another search
GitHub now supports two-factor authentication with security keys using the WebAuthn API
Yesterday, GitHub announced that it now supports Web Authentication (WebAuthn) for security keys. In addition to time-based one-time password (TOTP) applications and text messages,...
Twitter and Facebook removed accounts of Chinese state-run media agencies aimed at undermining Hong...
Update August 23, 2019: After Twitter, and Facebook Google has shutdown 210 YouTube channels that were tied to misinformation about Hong Kong protesters. The...
iPhone can be hacked via a legit-looking malicious lightning USB cable worth $200, DefCon...
While our phones are running low on battery, we do not think twice before inserting a USB to charge it. Also, while transferring files...
Google and Mozilla to remove Extended Validation indicators in Chrome 77 and Firefox 70
Last year, Apple removed the Extended Validation (EV) certificate indicators from Safari on both iOS 12 and Mojave. Now, Google and Mozilla are following...
Mimecast introduced community based tailored threat intelligence tool at Black Hat 2019
Yesterday, at Black Hat 2019, Mimecast Limited, a leading email and data security company, introduced Mimecast Threat Intelligence which offers a deeper understanding of...
Cloud Next 2019 Tokyo: Google announces new security capabilities for enterprise users
At its Cloud Next 2019 conference happening in Tokyo, Google unveiled new security capabilities that are coming to its enterprise products, G Suite Enterprise,...
A cybersecurity primer for mid sized businesses
The decision to which information security measures should be used across the company’s IT infrastructure and which ones should be left out may be...
Microsoft Defender ATP detects Astaroth Trojan, a fileless, info-stealing backdoor
Yesterday, the Microsoft Defender Advanced Threat Protection (ATP) Research Team shared details of a fileless malware campaign through which attackers were dropping Astaroth Trojan...
3 cybersecurity lessons for e-commerce website administrators
In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals...
A second zero-day found in Firefox was used to attack Coinbase employees; fix...
Earlier this week, Mozilla fixed a zero-day vulnerability that was being actively exploited by attackers. It released another security update yesterday when the Coinbase...