November 2016

Internet freedom around the world keeps decreasing
For the sixth year in a row, Internet freedom is declining. According to the latest Freedom on the Net report, 67 percent of all Internet users now live in countries where …

Telecrypt Decryptor foils ransomware’s simple encryption method
The recently spotted Telecrypt ransomware can be thwarted: malware analyst Nathan Scott has created a tool that decrypts the encrypted files. Telecrypt Decryptor works only if …

Six key principles for efficient cyber investigations
Many organizations today are not equipped to defend against traditional cyberattacks, as demonstrated by the ever-increasing numbers of successful breaches reported daily – …

Consumers are still making basic security faux pas online
Security remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, …

Cobalt hackers executed massive, synchronized ATM heists across Europe, Russia
A criminal group dubbed Cobalt is behind synchronized ATM heists that saw machines across Europe, CIS countries (including Russia), and Malaysia being raided simultaneously, …

How security collaboration will prove vital in 2017
The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National …

Unidirectional communications in a bidirectional world
Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from …

Was your data breach an inside job?
Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents …

This year’s most hackable holiday gifts
Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

DDoS protection quiz-based training course
The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. This comprehensive quiz-based training course, …

Michigan State University database with 400,000 student and staff records breached
Michigan State University has announced on Friday that a university server and a database containing information on some 400,000 faculty, staff and students has been accessed …

Over 2.8 million cheap Android smartphones come with preinstalled backdoor
If you’re using a cheap Android smartphone manufactured or sold by BLU, Infinix, Doogee, Leagoo, IKU, Beeline or Xolo, you are likely wide open to Man-in-the-Middle …
Featured news
Resources
Don't miss
- How to map and manage your cyber attack surface with EASM
- Google is making sending end-to-end encrypted emails easy
- North Korean IT workers set their sights on European organizations
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework