Why do companies fail to stop breaches despite soaring IT security investment?
Adding to the list of difficulties that surfaced last year, 2020 was also grim for personal data protection
The Hacker News
The Hacker News

Inside the War Between Deepfakes and Deepfake Detectors | Digital Trends
The criminal seeks to pull off a massive confidence trick, using expert sleight of hand and an uncanny ability to disguise himself as virtually anyone on the planet.
Luke Dormehl

Warning Issued For Millions Of Microsoft Windows 10 Users
The flaw lies in PC-Doctor Toolbox, systems analysis software which is rebadged and pre-installed on PCs made by some of the world’s biggest computer retailers, including Dell, its Alienware gaming brand, Staples and Corsair.
Gordon Kelly

5 dangerous apps you don`t know your kids are using
Let’s look at five dangerous apps the children you deeply care about may be using … and why they`re dangerous.
Fox News

The NSA is urging Windows users to update their computers ASAP
If you’re a Windows user who has yet to update your operating system after the discovery of the Bluekeep vulnerability a few weeks ago, then maybe a warning from the NSA will be enough to spur you on.
Andy Meek

The NSA Lost Control Of A Cyberweapon. Now It’s Being Used Against American Cities.
In 2017, the National Security Agency (NSA) lost control of some of the hacking tools...
Ashe Schow
Daily Wire

After IT attack, Genesee County upgrades position to include cyber security
The county has upgraded a top position in its Information Technology Department...
Ron Fonger
MI Live

Turning An Echo Into a Spy Device Only Took Some Clever Coding
IT`S IMPORTANT NOT to overstate the security risks of the Amazon Echo...
Lily Hay Newman

This server was online for under a minute before hackers were trying to crack it
New report demonstrates how prolific cyber attackers are - and the dangers of default login credentials.
Danny Palmer

Why you should never allow your web browser to save your passwords
When a web browser like Chrome, Firefox or Safari is allowed to store passwords, you`re putting your network security at risk.
Jack Wallen
Tech Republic

A Guide to LockerGoga, the Ransomware Crippling Industrial Firms
Ransomware has long been the scourge of the cybersecurity industry.
Andy Greenberg

It`s Time to Kill Your Eight-Character Password
It`s time to throw away any passwords of eight characters or less
Paul Wagenseil
Tom`s Guide

Cyber security 101: Protect your privacy from hackers, spies, and the government
Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.
Charlie Osborne and Zack Whittaker

Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 Years
Exclusive — If you have not updated your website to the latest WordPress version 5.0.3...
Swati Khandelwal
The Hacker News

2 Billion Unencrypted Records Leaked In Marketing Data Breach -- What Happened And What To Do Next
I woke up this morning to discover, yet again, that I was one of a stupidly large number of people whose personal data...
Davey Winder

3 ways state actors target businesses in cyber warfare, and how to protect yourself
The year 2019 is likely to see an increase of state actors taking aim at the private sector in foreign companies.
James Sanders
Tech Republic

DHS issues security alert about recent DNS hijacking attacks
The US Department of Homeland Security (DHS) has published today an "emergency directive" that contains guidance in regards to a recent report detailing a wave of DNS hijacking incidents perpetrated out of Iran.
Catalin Cimpanu

Cryptocurrency mining malware is the number one malware menace - again | ZDNet
Cryptojackers like CoinHive top Check Point’s ‘most wanted’ malware list – but Smoke Loader’s first entry points to what might be to come.
Danny Palmer

Del Rio City Hall Forced to Use Paper After Ransomwar
The City Hall of Del Rio, Texas was hit by a ransomware attack on Thursday, which led to multiple computers on the network being turned off and disconnected from the Internet to contain and analyze the malware
Sergiu Gatlan
Bleeping Computer

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple...
Jordan Robertson and Michael Riley