Please turn on your JavaScript for this page to function normally.
abstract, generic
Week in review: Kali Linux certification, cross-browser fingerprinting, most common passwords of 2016

Here’s an overview of some of last week’s most interesting news and articles: Fruitfly: Unusual Mac backdoor used for tightly targeted attacks? The malware – …

Western Union
Western Union admits it facilitated scammers, forfeits $586 million

Western Union has agreed to forfeit $586 million and enter into agreements with the Federal Trade Commission, the Justice Department, and several U.S. Attorneys’ Offices. …

bomb
Data breaches hit all-time record high, increase 40% in 2016

The number of U.S. data breaches tracked in 2016 hit an all-time record high of 1,093, according to a new report by the Identity Theft Resource Center (ITRC) and CyberScout. …

vulnerability
Advancing a standard format for vendors to disclose cybersecurity vulnerabilities

Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities. The work of the new OASIS …

talk
Most employees use unsanctioned group chat tools

Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …

Apple
Apple’s malware problem is accelerating

For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …

Kali Linux
Kali Linux certification, first official Kali book on the horizon

The Kali Linux distribution celebrates its 10th anniversary this year. The hugely popular open source project, maintained by Offensive Security, announced today that its new …

signature
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

lights
Growing risk associated with mobile and IoT application security

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

shopping
Retailers largely lack on-site security and IT expertise

A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …

Car
Open source cybersecurity framework for the automotive industry

A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …

architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

Don't miss

Cybersecurity news