Please turn on your JavaScript for this page to function normally.
Wireless
A rogue access point at RSA Conference? Here’s what happened

Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …

stop
Security concerns limit business initiatives

Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …

Fire
Week in review: First OS X ransomware, hacking Internet-connected trucks, CVE system problems

Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: OS X ransomware found bundled with legitimate software Palo Alto …

facepalm
Corruption: The magnitude of risk

40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the …

Lockheed Martin
Microfluidic cooling turns down the heat on high-tech equipment

Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is …

Has your network been compromised? Use RITA to find out

Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …

ear
Biometric tech uses sound to distinguish ear cavity shape

NEC is developing a new biometric personal identification technology that uses the resonation of sound determined by the shape of human ear cavities to distinguish …

criminal
How cybercriminals evade detection

A new report by Damballa highlights not only how cybercriminals can stay under the radar for long periods of time, but also the need for enterprises to reassess existing …

MariaDB
MariaDB Enterprise: Security at every level in the database

MariaDB announced MariaDB Enterprise Spring 2016. New capabilities defend data against application and network-level attacks, support faster development of high-performance …

Power lines
OnionDog APT targets the infrastructure industry

The Helios Team at 360 SkyEye Labs revealed that a group named OnionDog has been infiltrating and stealing information from the energy, transportation and other infrastructure …

HITBSecConf
Submissions open for CommSec Track at HITBSecConf Amsterdam

Alongside HITB2016AMS’s CommSec Exhibition Village there will be a separate CommSec Track (26 – 27 May). Hackers, makers, builders and breakers are invited to send …

Security
Sophisticated threats dictate future response strategies

Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, …

Don't miss

Cybersecurity news