Page 2 of 227

Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism

Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.

Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs

'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.

(Literally) Put a Ring on It: Protecting Biometric Fingerprints

Kaspersky creates a prototype ring you can wear on your finger for authentication.

The Edge Cartoon Contest: You Better Watch Out …

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

Navigating Security in the Cloud

Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.

Microsoft Issues Advisory for Windows Hello for Business

An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.

Attackers Continue to Exploit Outlook Home Page Flaw

FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft.

Application & Infrastructure Risk Management: You’ve Been Doing It Backward

Before getting more scanning tools, think about what's needed to defend your organization's environment and devise a plan to ensure all needed tools can work together productively.

TrickBot Expands in Japan Ahead of the Holidays

Data indicates TrickBot operators are modifying its modules and launching widespread campaigns around the world.

When Rogue Insiders Go to the Dark Web

Employees gone bad sell stolen company information, sometimes openly touting their companies, researchers say.