Please turn on your JavaScript for this page to function normally.
Uber
Uber to get privacy audit every two years

Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by …

IoT world
US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch …

Money
Worldwide information security spending will grow 7% in 2017

Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 …

healthcare
Medical devices and the Internet of Things: Defending against cyber threats

More than one-third (35.6 percent) of surveyed professionals in the Internet of Things-connected medical device ecosystem say their organizations have experienced a …

watch
AI is key to speeding up threat detection and response

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …

hands
Enterprise security culture: Why you need it, and how to create it

Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …

question
Motivation roulette: Is pseudo-ransomware a term?

It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

Gmail
Google wants iOS Gmail users to think twice about following suspicious links

Google has announced the rollout of new anti-phishing checks for the iOS Gmail app: in less than two weeks, all users will be confronted with two warnings if they attempt to …

arrows
Week in review: DNA-based malicious code injection, password power rankings

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New Cerber ransomware variant steals Bitcoin wallets, passwords Here’s a …

DNA
Researchers pull off DNA-based malicious code injection attack

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a …

lights
New infosec products of the week​: August 11, 2017

Forensically sound extraction of public domain social media data Cellebrite has introduced a new UFED Cloud Analyzer solution that provides forensically sound, real-time …

Don't miss

Cybersecurity news