Please turn on your JavaScript for this page to function normally.
Windows
Maintaining Windows 10 security tops list of enterprise challenges

Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over …

Apache
Optionsbleed bug makes Apache HTTP Server leak data from memory

On Monday, security researcher Hanno Böck detailed a memory-leaking vulnerability in Apache HTTP Server that’s similar to the infamous OpenSSL Heartbleed bug uncovered …

camera
Using security cameras and infrared light to extract data from air-gapped networks

Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light …

Trusted IoT
Setting the standard for a blockchain protocol for IoT

A wide range of blockchain technology companies and enterprises like Cisco, Gemalto and Bosch have launched the Trusted IoT Alliance, an initiative that aims to bring …

businessman
The evolving nature of the CISO role

As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …

war games
The three least effective enterprise security measures

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will …

defend
Number of lost, stolen or compromised records increased by 164%

According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last …

iOS 11
Apple releases iOS 11

Starting yesterday, iPhone and iPad customers around the world can update their devices to iOS 11. While the list of new features and improvements is huge, here are some that …

Google Chrome
Google Chrome most resilient against attacks, researchers find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as …

user
Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …

CCleaner
A clearer picture of the CCleaner backdoor incident

On Monday, Cisco and Piriform – the Avast-owned company behind the popular CCleaner utility – announced that certain versions of the software have been backdoored …

abstract
Digital future: Are we ready for what’s next?

The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …

Don't miss

Cybersecurity news