UK residents hit with extremely personalized scam emails
A compelling and potentially very successful email spam campaign is being leveraged against UK residents, warns Sophos researcher Paul Ducklin. The email addresses the …
(IN)SECURE Magazine issue 53 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 53 has been released today. Table of contents How …
Actively exploited zero-day in IIS 6.0 affects 60,000+ servers
Microsoft Internet Information Services (IIS) 6.0 sports a zero-day vulnerability (CVE-2017-7269) that was exploited in the wild last summer and is likely also being exploited …
Number of compromised records up 566% in 2016
The number of records compromised grew a historic 566 percent in 2016 from 600 million to more than 4 billion. These leaked records include data cybercriminals have …
How CIOs are shaping the future of work
IT leaders are poised to make radical changes in the workplace, but boardrooms are holding back progress by continuing to place too much emphasis on reducing costs and keeping …
Mastercard acquires NuData Security
Mastercard has entered into an agreement to acquire NuData Security, a technology company that helps businesses prevent online and mobile fraud using session and biometric …
US Congress votes for ISPs to be able to sell customers’ info and browsing history
After the US Senate, the US House of Representatives has voted on whether the privacy rules imposed late last year by the Federal Communications Commission (FCC) on Internet …
Siemens RUGGEDCOM industrial communication devices vulnerable to remote attacks
All version of Siemens RUGGEDCOM ROX I VPN endpoints and firewall devices sport five vulnerabilities that can be exploited by attackers to perform actions with administrative …
Phishers offer WoW players free in-game pets
Avid World of Warcraft players are being targeted with phishing emails seemingly coming from Blizzard Entertainment, the video game developer behind the popular multiplayer …
Why we should define our right to privacy now, before it’s too late
The debate has stirred up again. Talk of wiretapping and government spying has spurred another bout of privacy versus security. Internet of Things (IoT) devices have raised …
Modern security programs: Artificial intelligence and machine learning
A new research report by Carbon Black aggregates insight from more than 400 interviews with leading cybersecurity researchers who discussed non-malware attacks, artificial …
Don’t forget to pack security for the journey to the cloud
When you move workloads to public cloud platforms, you offload many tasks on the cloud provider, but don’t fall for the misconception that you’re entirely off the hook with …
Featured news
Resources
Don't miss
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity
- Stratoshark: Wireshark for the cloud – now available!
- Mirai botnet behind the largest DDoS attack to date