Ransomware has already raked in around US$209 million from enterprises alone in the first quarter of 2016. Unfortunately, it's just one of the many possible threat types that exploit kits can deliver to vulnerable systems.
Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
The latest hacks on Ubuntu, Clash of Kings, Warframe, and most recently, Disney’s Playdom have two things in common—all are running vBulletin. Learn more.
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world.
Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?
Vetted hackers who participated in the Department of Defense’s ‘Hack the Pentagon’ bug bounty program uncovered over 100 security flaws in its public websites.