Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...

Nearly half a million Covid-related domains have been created over the last two years, many of them being used by online fraudsters. The pandemic has created an environment in which bad actors make use of a range of Covid-related "hooks" to commit cybercrime and fraud, impacting consumers and brand...

Cybersecurity researchers uncovered a vicious new threat that hides as legitimate systems software. With Linux kernel 5.12 you can update firmware, no reboot required. The last refinement in LibreOffice 7 series paves the way for a new set of features when Series 8 arrives. If that is not enough to ...

The biggest breach of the period was actually a combination of several cyber smash-and-grab operations over the years that contained 3.2 billion unique email and password combinations from Netflix, LinkedIn and other online outfits.

Russian authorities on Friday reported that they shut down the REvil ransomware operations and arrested a dozen or more gang members. The Federal Security Service of the Russian Federation said it quashed the REvil ransomware gang after U.S. authorities reported on the leader.

Cybercriminals in 2022 will move from identity theft to identity fraud, predicted the Identity Theft Resource Center. Bad actors are accumulating personal identifying information, but they're not using it to target consumers as much as they used to do. Rather, they're using it in credential attacks ...

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

Bot activity at websites is skewing marketing analytics and costing businesses millions annually, according to a study by bot detection and mitigation firm Netacea. The company maintained in its report that the skewed analytics problem is as costly to businesses as click fraud, which costs businesse...

The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...

'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...

EXCLUSIVE INTERVIEW

How Merchants Can Better Battle Chargebacks and Fraud

Cash flow concerns and fraud are going to be a menace to both retailers and consumers this holiday shopping season. One of the biggest shopping headaches this year will be a much earlier start to the chargeback cycles. Jeff Wixted, vice president of marketing and client solutions at Accertify, discu...

A survey of 1,050 U.S. adult consumers found that 16 percent of the participants in the research took no action after receiving notice of a data breach affecting their accounts. Information from breached accounts can be used for identity fraud or to make employers vulnerable to cyberattacks, includi...

Which review ratings influence your decision to purchase a product or service?
- select any that apply -
Loading ... Loading ...

LinuxInsider Channels