Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Surveillance cameras most dangerous IoT devices in enterprise

Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities, according to a new report

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data while companies focus too much on sophisticated attacks

Leaky IoT devices help hackers attack e-commerce sites

Leaky IoT devices help hackers attack e-commerce sites

Akamai first noticed a big spike in attacks that used credentials from breaches such as the recent Yahoo hack, and traced them to badly configured IoT devices

Data leaks evolving into weapons of business destruction

Data leaks evolving into weapons of business destruction

Increasingly, attackers are using data leaks to target the companies themselves, going after proprietary or embarrassing information and releasing it in such a way as to do the most harm.

A single ransomware network has pulled in $121 million

A single ransomware network has pulled in $121 million

A ransomware author was able to collect $121 million in ransomware payments during the first half of this year

Cerber ransomware earns $2.3M with 0.3% response rate

Cerber ransomware earns $2.3M with 0.3% response rate

The fast-growing Cerber ransomware uses an affiliate distribution model that recruits non-technical customers, according to a new report by Check Point

New HIPAA guidance addresses ransomware

New HIPAA guidance addresses ransomware

New guidance stresses need for regular backups and confirms that a ransomware attack is a breach that must be disclosed

Study: Encryption use increase largest in 11 years

Study: Encryption use increase largest in 11 years

But encryption technology spending as percent of total IT security budgets has gone down, as encryption is now built into many tools

Study: Most companies can't protect confidential documents

Study: Most companies can't protect confidential documents

Of the IT practitioners surveyed, 68 percent said they don't even know where their confidential information is located

US phone users least likely to switch after security breach

US phone users least likely to switch after security breach

Slow updates by carriers and manufacturers are a long-standing problem, but survey shows that globally, 47 percent of consumers would switch carriers in the event of a security breach

Laptop updaters riddled with security holes

Laptop updaters riddled with security holes

Test of pre-installed updater software on 10 laptops showed every one had security problems

Enterprises fall behind on protecting against phishing, detecting breaches

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

27% of US office workers would sell their passwords

27% of US office workers would sell their passwords

Password hygiene is actually deteriorating, despite all the recent media attention on data breaches, according to a new survey

Verizon releases first-ever data breach digest with security case studies

Verizon releases first-ever data breach digest with security case studies

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study

Companies detect breaches sooner, but attackers have gotten nastier

Companies detect breaches sooner, but attackers have gotten nastier

Organizations are getting better at spotting breaches -- nearly 30 percent sooner, according to a new report from Mandiant

Study finds anti-encryption laws won't work on an international stage

Study finds anti-encryption laws won't work on an international stage

Passing anti-encryption laws wouldn't change a thing, as criminals and terrorists would simply look globally for alternatives

China's next five-year plan offers clues about cyber security targets

China's next five-year plan offers clues about cyber security targets

Is your industry next in line to be targeted by China's government-sponsored hackers?

Average successful hack nets less than $15,000

Average successful hack nets less than $15,000

Survey of cyber attackers shows the majority are motivated by money, but they make a quarter of what a cyber security professional makes

27% of all malware variants in history were created in 2015

27% of all malware variants in history were created in 2015

Last year was a record year for malware, with more than 84 million new malware samples collected over the course of 2015

Over 113 million health records breached in 2015 -- up 10-fold from 2014

Over 113 million health records breached in 2015 -- up 10-fold from 2014

One out of every three Americans was affected by a healthcare record breach last year

Load More