Please turn on your JavaScript for this page to function normally.
IoT
Ready, set, race to the IoT hub

Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …

WannaCry
WannaCry: Who’s behind it? Who’s to blame?

As the amount of money in the three bitcoin addresses associated with the WannaCry attack slowly continues to rise, the question of who is behind the ransomware is still …

DocuSign
DocuSign breached, stolen info used for targeted phishing campaign

Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically …

apple
Apple issues security updates for macOS, iDevices

It’s time to patch your Mac, iDevices and software again: Apple has released security updates for MacOS (all the way back to Yosemite), iOS, watchOS, tvOS, iTunes, …

stock price
After a data breach is disclosed, stock prices fall an average of 5%

Data security breaches can negatively impact an entire organization – including sales, marketing and IT – and have a significant negative impact on company …

person
Are you making it easier for identity thieves?

News of data breaches and the risks of identity theft and fraud persist, but consumers’ vigilance and awareness haven’t kept pace. A national survey by Experian …

Google Chrome
Stealing Windows credentials using Google Chrome

Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in various ways but usually limited to …

airplane cabin
United Airlines cockpit access codes leaked online

A United Airlines flight attendant has inadvertently leaked access codes for the company’s airplanes’ cockpit doors, a safety alert email to United employees has …

hand
Major international crackdown on tech support scams

The FTC, along with federal, state and international law enforcement partners, announced Operation Tech Trap, a nationwide and international crackdown on tech support scams …

danger
A guide on how to prevent ransomware

Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the …

Microsoft
Microsoft to governments: Stop hoarding vulnerabilities

Microsoft is full of surprises lately: first they issued patches for unsupported versions of Windows, then they publicly criticized the NSA for hoarding knowledge about …

smart cybersecurity spending
Key to smart cybersecurity spending: Remove redundancies and strive for unification

Over the past two decades, the cybersecurity industry has been completely transformed. For organizations, cybersecurity’s evolution from a cottage industry to an economic …

Don't miss

Cybersecurity news