Please turn on your JavaScript for this page to function normally.
hard drive
Used devices are a treasure trove of personally identifiable information

40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …

puzzle
A new approach is needed in the battle against cyber attacks

How do you search for something that’s invisible? An increase in the sophistication of cyber attacks means that it takes an average of 146 days before a corporate hack is …

abstract
Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Malware posing as Siemens PLC software is hitting industrial environments …

Symantec
Google to sanction Symantec for misissuing security certificates

In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing …

Money
GoDaddy acquires Sucuri

GoDaddy has entered into an agreement to purchase Sucuri, a provider of website security products and services. Financial details of the transaction were not disclosed. Sucuri …

lights
New infosec products of the week​: March 24, 2017

Lookout expands mobile endpoint security solution As a new Apple mobility partner, Lookout is introducing enterprise app review to enable enterprises building their own iOS …

smartphone
Lack of security patching leaves mobile users exposed

An analysis of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than …

healthcare
Healthcare IT pros believe data is safer in the cloud

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer …

Minecraft
Minecraft players get scams instead of mods

Google has recently removed 87 fake Minecraft mods from Google Play, after being notified by researchers about their malicious nature. A partial list of these malicious …

industry
Malware posing as Siemens PLC software is hitting industrial environments

What kind of malware is hitting industrial control systems, and how worried should we and the operators of theses systems actually be? These are question that Ben Miller, …

PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

Microsoft Word
Sushi or pizza? Mac or Windows threat?

Fortinet researchers have made an unusual find: a malicious Word file that is meant to target both OS X and Windows users. As has lately become the norm, when opened, the file …

Don't miss

Cybersecurity news