dcsimg

Ex-Fox News hosts Bolling, Van Susteren apparently hacked

Former Fox News hosts Eric Bolling and Greta Van Susteren appeared to have their Twitter accounts taken over by self-identified Turkish hackers on Tuesday. The hacked account posted photos of Bolling's direct messages on Tuesday night... … [Read more...]

Overnight Cybersecurity: Bipartisan bill aims to deter election interference | Russian hackers target Senate | House Intel panel subpoenas Bannon | DHS giving 'active defense' cyber tools to private sector

Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We're here to connect the dots as leaders in government, policy and industry try to counter the rise in cyber threats. What lies... … [Read more...]

North Korean hacker group linked to cryptocurrency attacks in South Korea

North Korea carried out a cyber campaign against South Korea through late last year, stealing cryptocurrency with malicious software similar to that used in the high-profile attacks of Sony Pictures Entertainment and the WannaCry ransomware attacks... … [Read more...]

Be wary of Mega Millions winner “giveaway” on social media

I don’t do lotteries, but if I did, I’d probably never, ever win in a million years. That’s not a problem faced by 20-year-old Shane Missler, winner of the fourth-largest haul in Mega Millions’ 21 years of handing out large bundles of cash. He’s on record as saying he wants to “do some good” for humanity, but I suspect he may have to do some good in the … [Read more...]

Researchers identify Android malware that can 'spy extensively'

Kaspersky Lab on Tuesday sounded the alarm about the discovery of highly advanced surveillance software that it said can infiltrate Android mobile devices and gather “targeted” information without users’ consent.Researchers at the Moscow-based... … [Read more...]

DHS giving ‘active defense’ cyber tools to private sector, secretary says

The Department of Homeland Security (DHS) is providing tools and resources to private companies to engage in “active defense” against cyber threats, its secretary said Tuesday, a practice that has drawn scrutiny from some legal and cybersecurity... … [Read more...]

The Biggest Emerging Cybersecurity Threats in 2018

2018 may have just started, but it's never too early to be aware of potential security threats and how to prevent them in the future. Here's a roundup of some of the organizations, security flaws, and other things that go bump in the night to watch out for. … [Read more...]

Don’t let cyberloafing crush productivity

Cyberloafing can present significant costs to your business, but with the right solutions in place, you can ensure your business remains productive and your coworkers remain happy. … [Read more...]

Thycotic Closes Out 2017 with Record Growth

WASHINGTON, Jan. 16, 2018 /PRNewswire/ — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, has ended an epic 2017, outperforming previous years by ending with 60 percent year-over-year sales growth. In addition to this incredible growth, in Q4 alone, the company added more than 160 new customers. Thycotic’s continued … [Read more...]

GDPR—Meeting the 72-hour breach notification period

Beyond the Earth-Moon system, thousands of asteroids known as Near-Earth Objects (NEOs) are known to exist. These rocks periodically cross Earth’s orbit and make a close flyby of Earth. Over the course of millions of years, some even collide with the Earth, causing mass extinctions. Little wonder then why NASA’s Center for Near Earth Object Studies (CNEOS) is dedicated to monitoring the larger … [Read more...]