Please turn on your JavaScript for this page to function normally.
Week in review: Mac ransomware, women in infosec, and the death of SHA-1

Here’s an overview of some of last week’s most interesting news, articles and podcasts: The dangers that come with buying pre-owned IoT devices When you buy a …

Wi-Fi
Results of the rogue Access Point experiment at RSA Conference 2017

The security of open Wi-Fi hotspots has been a subject of great concern for years. But, would you believe that we were overwhelmingly successful using Wi-Fi attacks dating …

connected
Biggest limiting factors to universal adoption of connected devices

After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

numbers
Cloud-based databases need new approaches to ensure data security

Interest and adoption of cloud-based databases is ramping up as more companies see the value of moving from traditional on-premise IT infrastructures to off-premise cloud …

healthcare
The devastating impact of healthcare data breaches

One in four U.S. consumers have had their personal medical information stolen from technology systems, according to Accenture. The findings show that half of those who …

architecture
Key obstacles to digital transformation and data privacy compliance

To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …

signature
Adobe unveils cloud-based digital signature built on an open standard

With more than seven billion mobile devices in the world and cyber-threats at an all-time high, demand has surged for simple and secure ways to sign and manage documents on …

hands
How people-based actions put critical data at risk

While 80 percent of respondents believe it’s important to understand the behaviors of people as they interact with intellectual property and other critical business …

danger
Advanced Windows botnet spreads Mirai malware

Kaspersky Lab experts are analyzing the first Windows-based spreader for the Mirai malware as part of a concerted effort to close down Mirai botnets in the wild. The Windows …

shadow
Ransomware attacks growing rapidly, organizations are struggling

The percentage of ransomware attacks increased from 5.5%, to 10.5% of all recognized malware attacks from July to December 2016, according to Check Point. Check Point …

healthcare
Is healthcare industry’s security spending focused on the wrong technologies?

Global healthcare IT professionals are confronting a rapidly changing, challenging landscape, with 66% experiencing a data breach and 88% feeling vulnerable as a result. In …

person
Insider threat vs. inside threat: Redefining the term

The traditional meaning of “insider threat” is: a current employee or contractor who, intentionally or accidentally, misuses his or her authorized access to a secure network …

Don't miss

Cybersecurity news