Please turn on your JavaScript for this page to function normally.
cloud migration
Standard cloud migration models are insufficient when moving mission critical workloads

Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …

criminal hacking
Criminal hacking: Top technology risk to health, safety and prosperity

Americans believe criminal hacking into computer systems is now a top risk to their health, safety and prosperity. Criminal hacking, a new ESET survey finds, outranks other …

arrows
Week in review: CCleaner compromise, Optionsbleed, and Linux devices sending out spam

Here’s an overview of some of last week’s most interesting news and articles: Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco There is a new …

corporate cloud
Enterprise cloud adoption and IaaS security

Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service …

modem router
Is your router sending out spam?

A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor …

danger
Spoofed IRS notice delivers RAT through link updating trick

The malware delivery trick involving updating links in Word documents is apparently gaining some traction: the latest campaign to use it likely takes the form of fake emails …

vault
New infosec products of the week​: September 22, 2017

Cyber-defense for critical infrastructure including factories, plants, utilities & hospitals NTT Security has launched IT/OT Integrated Security Services, delivered via a …

fish phishing
46,000 new phishing sites are created every day

An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s …

Facepalm
Equifax directed consumers to fake phishing site for weeks

You can now add another blunder to the already long list of Equifax’s missteps in the wake of the massive breach it announced earlier this month: the company has been …

snake
Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco

There is a new twist in the CCleaner hack saga: the attackers apparently didn’t set out to compromise as many machines as possible, but were after some very specific …

dark
Three things to know about the dark web

One of the more curious aspects about the dark web is that it didn’t start out as such a dark place: it began with bulletin boards in the 80s and 90s – the markets of …

connections
Legacy networks holding back cloud and digital transformation

A new global survey by Riverbed Technology, which includes responses from 1,000 IT decision makers across nine countries, revealed an incredible level of agreement that legacy …

Don't miss

Cybersecurity news