Please turn on your JavaScript for this page to function normally.
Thyssen-Bornemisza Museum
How a museum protects some of the world’s finest pieces of art

After an internal audit revealed the limitations of Thyssen-Bornemisza Museum’s existing (analog) camera surveillance system, as well as a server that has been installed …

binary
Getting the most out of your SIEM investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These …

tunnel
Businesses overconfident about keeping attackers at bay

Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …

food kiosk
PoS malware hits food kiosks, steals payment card info

PoS malware can lurk in the most unexpected of places, and some have recently been found in the payment kiosks by US-based vendor Avanti, stealing payment card information. …

phishing
Man stole bitcoin by phishing individuals on the dark web

Michael Richo, a 35-year-old from Connecticut, had the brilliant idea of stealing bitcoin from people involved in illegal deals through dark web marketplaces. Perhaps he …

London
UK executives badly informed about where data is stored compared to other countries

When it comes to data compliance matters, one in five business decision makers within the UK admit they do not know which compliance regulations their company is subject to, …

Acunetix 11
Review: Acunetix 11

Acunetix is one of the biggest players in the web security arena. The European-based company released the first version of their product back in 2005, and thousands of clients …

Abstract 7
Week in review: Windows 10 against crypto ransomware, satellite phone comms decryption

Here’s an overview of some of last week’s most interesting news and articles: 66% of US law firms reported a breach in 2016 The majority of US-based law firms are …

earth
Satellite phone communications can be decrypted in near real-time

Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved. The vulnerable cipher The …

Kodi
Why Kodi boxes can pose a serious malware threat

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …

person
Operators of decade-old Malware-as-a-Service outfit charged

As Crackas With Attitude hacker “Incursio” got handed a 2-year prison sentence for gaining unauthorized access to government computers and online accounts of a …

idea
Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …

Don't miss

Cybersecurity news