- Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers.
- Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
- The operators of REvil and Gootkit have begun using a tried and tested technique to distribute additional malware, Sophos says.
- Earnings report points to diversion of care during incident for financial loss.
- The Unc0ver team has released a tool that works on iOS 11 and later, and exploits a vulnerability that was recently under attack.
- NinjaRMM, which provides tools for managed service providers, aims to create a red team capability following years of attacks against MSPs.
- The proper template for a modernized SOC team is one that operates seamlessly across domains with a singular, end-to-end view.
- How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work — and which skills are hot right now.
- A new document provides guidance for businesses planning to implement a zero-trust system management strategy.
- Some jokes never get old.
- When a search result looks too good to be true – it IS too good to be true!
- Here's the latest Naked Security Live talk – watch now!
- Latest episode – listen now!
- It's a bit like Snapchat all over again – but this bug was quickly fixed.
- "It's a DoS, Jim, but not as we know it."
- Here's the latest Naked Security Live talk – watch now!
- He was either the smallest person who has ever lived, by an order of magnitude, or the heaviest person ever known, by two of them.
- Latest episode, listen now! (Includes special gardening safety section at no extra charge!)
- Trio alleged to have been at it for more than a decade, and to have made off with well over a billion dollars.
- Stay away from popup surveys that want personal data. Tell your friends…