Software

Back to homepage

Post Equifax Plea: Change Your Software Security Practices or Be Damned (Again)

On September 8, 2017, Equifax revealed that they suffered a massive data breach, with approximately 143 million records compromised, including social security numbers, first and last names, birth dates, addresses, and more

Vulnerability in code library allows attackers to work out private RSA keys

Researchers have discovered a security vulnerability in the Infineon-developed RSA library, which could be exploited by attackers to discover the RSA private key corresponding to an RSA public key generated

The pervasive risk of vulnerable open source components

Veracode announced findings from the 2017 State of Software Security Report, a comprehensive review of application security testing data from scans conducted by a base of more than 1,400 customers.

New Scam Impersonates VAT Form to Deliver Malware

Researchers from Trustwave have unearthed a scam impersonating Her Majesty’s Revenue & Customs (HMRC) to trick victims into downloading malware.According to the security firm, on September 6 2017, scammers launched an email phishing attack

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Since October is National Cyber Security Awareness Month (NCSAM), it’s an ideal time to consider how you sign in to your accounts. It may seem simple and obvious, but account

Ransomware Sales on the Dark Web Surged by 2,502 Percent in the Past Year

Sales grew from $250,000 in 2016 to more than $6.2 million in 2017, according to a recent report.The past year saw a 2,502 percent increase in sales of ransomware on the dark

The evolution of cybercrime tactics and techniques in Q3 2017

Breaches of proprietary systems remain high, but law-enforcement continues to make strides in their efforts to combat such attacks.Multi-language tech support scams are on the rise globally, driven by geo-targeted

Ransomware Grabs Headlines but BEC May Be a Bigger

With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.Recently, ransomware like WannaCry or Petya has generated dramatic headlines

Investigation reveals large botnet hiding behind Fast Flux technique

Fast Flux, a DNS technique first introduced in 2006 and widely associated with the Storm Worm malware variants, can be used by botnets to hide various types of malicious activities

How the transition to Everything as a Service upended cybersecurity software models

With regard to the evolving stratification of security services, it is worth spending some time considering how reoccurring software-based service models have fundamentally upended network and cyber security businesses across