Please turn on your JavaScript for this page to function normally.
tunnel
Are you employees snooping on the corporate network?

The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …

Google Chrome
ESET helps Google protect Chrome users from unwanted software

Google has redesigned Chrome Cleanup on Chrome for Windows, and has upgraded the technology it uses to detect and remove unwanted software. A basic antivirus for Chrome …

Adobe Flash
Adobe releases emergency fix for Flash Player zero-day exploited in the wild

Adobe has released an out-of-band security update for Adobe Flash Player that patches a zero-day remote code execution vulnerability actively exploited in the wild. Kaspersky …

stock price
Digital transformation, regulations impacting data security decisions at financial organizations

Almost half (49%) of global financial services organisations have experienced a data breach in the past, according to the 2017 Thales Data Threat Report, Financial Edition. …

open source
Companies turn a blind eye to open source risk

Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …

GDPR
As GDPR implementation date approaches, cyber risk gets more attention

The upcoming implementation of the European Union’s General Data Protection Regulation (GDPR), which takes effect in May 2018, has elevated cyber risk to the top of the …

wireless
WPA2 weakness allows attackers to extract sensitive info from Wi-Fi traffic

WPA2, a protocol that secures modern protected Wi-Fi networks, sports serious weaknesses that can allow attackers to read and capture information that users believe to be …

Android
Android DoubleLocker ransomware encrypts data, changes device PIN

A new piece of ransomware is targeting Android users. Dubbed DoubleLocker, it both encrypts users’ files and changes the device’s PIN. About DoubleLocker Lukáš …

chess
Using a robust platform for cyber threat analysis training

We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …

Office 365
Office 365 adoption drivers, risks, and opportunities

Over 1,100 organizations ranging from single-person businesses to companies with more than 10,000 employees participated in a survey from various regions around the globe …

building blocks
Almost half of non-IT and data pros don’t understand blockchain

A survey of over 200 board level UK executives has found that while over half of businesses sampled are planning blockchain initiatives, less than 1 in 10 believe they have …

talk speak speaker
Week in review: iOS phishing, and three reasons to secure your data now

Here’s an overview of some of last week’s most interesting news and articles: Inventive cyber gang steals millions from East European banks Trustwave researchers …

Don't miss

Cybersecurity news