Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
Shazam says it plans to update its music application for Mac after a researcher found it leaves a computer's microphone on when users have attempted to turn it off.
FriendFinder Networks, which runs thousands of adult-themed sites in what it describes as a "thriving sex community," may have been breached again, according to a website that collects stolen data.
Yahoo in 2014 spotted that an attacker - later revealed to have compromised 500 million accounts - was inside its network, according to a new SEC filing. With Yahoo's $4.8 billion sale to Verizon still pending, the admission adds to the search giant's complications.
A group that hacked the Democratic National Committee - believed to be operating from Russia - has resumed its spear-phishing attacks, including fake emails bearing the names of Harvard University and the Clinton Foundation.
A bill in New Zealand's parliament strives to clear up what the government contends is ambiguity in laws governing its spy agencies, but worries abound that the legislation is too broad.
Did security vendor Cylance lean too heavily on decade-old research into weaknesses in a still-used electronic voting machine in order to get pre-election day headlines? A company spokesperson says no.
The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
DDoS attacks apparently were directed at the small west African country of Liberia from the same botnet that struck networking services provider Dyn. Were the attacks just a test for a bigger attack to come?
A potentially explosive story suggests that there were secret communications between Russia and U.S. presidential candidate Donald Trump's business. But computer security experts have dismissed the report, saying it's based on a flawed interpretation of technical information.
The Shadow Brokers - the group that released what are purported to be hacking tools tied to the NSA - returns with what it claims to be a list of exploit-staging servers used by the U.S. intelligence agency to stage its cyber-attack and surveillance operations.
The online advertising industry has a malware problem that, in part, has driven increased use of ad-blocking software. It's facing a complicated task: Clean up the security problems or face possible regulation.
Australia's largest-ever known data leak wasn't caused by hackers. Instead, a contractor mistakenly posted a database of blood donor information on a public website, showing how a simple mistake can have deep repercussions.
Apple's security defenses have improved dramatically in recent years, but poorly written drivers in third-party applications could provide key access to critical parts of macOS.
Neutering the army of web-connected devices used in the large internet attack that hampered access to major sites - including Amazon, PayPal, Spotify and Twitter - is technically possible. But no option offers either a great or near-term fix.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.