Please turn on your JavaScript for this page to function normally.
map
Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

market
Worldwide security appliance revenue increased to $3 billion

According to IDC, the total security appliance market saw positive growth in both vendor revenue and unit shipments for the second quarter of 2017 (2Q17). Worldwide vendor …

danger
Cybercriminals deploying assortment of banking Trojans and ransomware

Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …

CCleaner
Hackers backdoored CCleaner, likely affecting millions of users

Legitimately signed but backdoored versions of the popular CCleaner utility were available for download from the developer’s Web site and servers for nearly a month, …

netdata
Netdata: Distributed real-time performance and health monitoring

Netdata is a system for distributed real-time performance and health monitoring. It provides real-time insight of everything happening on the system it runs (including …

Apple Face ID
Apple’s Face ID can be quickly disabled in an emergency

A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The …

cloud binary
Most cloud services still not GDPR-ready

With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding …

bulb
AI will change the face of security, but is it still the stuff of sci-fi?

The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …

fire
Week in review: Dangerous Bluetooth, EU cybersecurity certification, how Equifax hackers got in

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Equifax breach happened because of a missed patch The attackers who …

Microsoft Azure
Microsoft Azure confidential computing keeps data in use secret

Microsoft has announced a new Azure (cloud) data security capability: confidential computing. Who’s it for? The capability allows companies to use the cloud even if they …

Google Chrome
Chrome will tag FTP sites as “Not secure”

Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome …

Apple Face ID
iPhone X gets facial authentication, is the enterprise next?

This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on …

Don't miss

Cybersecurity news