Please turn on your JavaScript for this page to function normally.
Telegram
Russia threatening to ban Telegram encrypted messaging app

Roskomnadzor, Russia’s communications regulator, is threatening to ban the use of popular encrypted messaging app Telegram. The request Roskomnadzor is a federal agency …

Anthem
Anthem ready to pay $115 million to settle data breach lawsuit

US health insurer Anthem has agreed to pay $115 million to settle a class-action suit mounted in the wake of the massive data breach it suffered in late 2014/early 2015. The …

Berlin
German law enforcement gets new hacking powers

On Thursday, the Bundestag has voted to accept a new amendment that will expand the German police’s hacking powers. The new amendment will allow them to use so-called …

danger
With ransomware, pay up if you want to keep paying

A hospital CEO is contacted in the middle of the night with a dire warning. Hackers have taken control of computer systems used for patient care, CT scans, and lab work. The …

city
Most businesses will not put off cloud adoption because of security concerns

Businesses are pressing ahead with their digital transformation plans, despite fears of being hit by a cyber attack or data protection regulations. This is according to a new …

Bug
Crowdsourced security testing and bug bounties

In the past few years, the bug bounty economy has been growing steadily, with more organizations getting on board every day. In this podcast, Ilia Kolochenko, CEO at High-Tech …

fractal generic center evolution spread
Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers

Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of …

CIA
How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via …

password
Password Reset MITM: Exposing the need for better security choices

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

BEC scams
Internet crime: The continuing rise of the BEC scam

Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the …

network
New infosec products of the week​: June 23, 2017

API Behavioral Security: Detecting and blocking attacks targeting API infrastructures Elastic Beam unveiled its flagship solution, API Behavioral Security (ABS), the first …

cloud proliferation
Organizations still unclear on cloud security responsibility

Vanson Bourne surveyed 1,300 IT decision makers from organizations using public cloud Infrastructure as a Service (IaaS) from the Americas, Europe, Middle East and Africa …

Don't miss

Cybersecurity news