Worldwide infosec spending to reach $90 billion in 2017
Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to …
Sensitive US Air Force data found exposed online
A misconfigured, unsecured backup drive containing a huge amount of sensitive (but not classified) data on US Air Force officers has been sitting online, accessible to anyone, …
Double Robotics Telepresence Robot can be hacked
Rapid7 researchers have discovered a number of vulnerabilities in the Double Robotics Telepresence Robot, the company’s iPad-based telepresence device that looks a bit …
Several high risk 0-day vulnerabilities affecting SAP HANA found
Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …
Will the IoT force truck stops?
“Not with a bang, but with a whimper,” that was how T.S. Eliot described how the world would end, in his 1925 poem “The Hollow Men.” Things don’t always end in …
A new age of digital signatures is upon us
The increased adoption of digital signatures should not come as a surprise: many businesses are trying to digitalise their everyday processes, and digital signatures are both …
Threat operations and management with ThreatQ
In this podcast recorded at RSA Conference 2017, Ryan Trost, CTO at ThreatQuotient, discusses the relevance of threat intelligence, as well as the ThreatQ platform, designed …
Top five most wanted malware families worldwide
The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …
Intel’s CHIPSEC can detect CIA’s OS X rootkit
As details about CIA’s hacking capabilities and tools are, bit by bit, popping to the surface, companies are trying to offer users some piece of mind. In the wake of …
Most security pros expect increasing attacks on Industrial Internet of Things
A new Dimensional Research survey looked at the rise of Industrial Internet of Things (IIoT) deployment in organizations, and to what extent it is expected to cause security …
Android devices delivered to employees with pre-installed malware
A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees. These were smartphones by …
Reinventing software patching, curing big security holes
Today’s security updates are too big, too risky and too late. It is common for enterprises to thoroughly test security updates and install them several months after they have …