Using data science, cybersecurity researchers have released a new approach that makes automated phishing exploits almost as fruitful as typically more time-consuming spear-phishing methods.
HTTP/2 Bugs Could Deny Service for Millions
Imperva urges firms to implement safeguards
Italian Android RAT Targets China and Japan
New info-stealing malware could be part of wider APT campaign
#BUHSA Attacks on Activists are Prevalent, but Unsophisticated
State-sponsored attacks and tool used have been observed to not be sophisticated, but activists remain in danger.
#BHUSA: 15 Years of Under-investment in Cybersecurity Makes Us Think the Sky is Falling
We can’t stop spending on cybersecurity in favour of cyber-insurance, say Deloitte researchers at Black Hat, Las Vegas
#BHUSA Build Backdoors and Government Will Use Them
Law enforcement has become more aggressive because of encryption, as law enforcement become more eager to access details in investigations.
#BHUSA: How to Use Linguistic Forensics to Detect Phone Scammers
There is a non-technological solution to defending against phone scammers, said Dr Judith Tabron at Black Hat USA 2016, and it’s at the human level…
Just in Time for the Olympics, Panda Zeus Chomps Into Brazil
One hungry bear, this Zeus variant is targeting banks, Bitcoin users and local services, just as the country prepares to host the Olympic Games.
#BHUSA: Microsoft AMSI Stops Script-based Attacks
Stopping script-based attacks can often be an issue of using the protections that are available, and an anti-malware scan interface can help, says pen test expert at Black Hat
Syria’s Terrorist Diaspora
Rebeccah L. Heinrichs, Providence Journal Islamist terror attacks are on the rise, but this has not caused the Obama administration to waver in its goal to welcome at least 10,000 Syrian…