Please turn on your JavaScript for this page to function normally.
Week in review: New C++ bugs, preventing insider threats, and gamifying threat detection

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Redefining security visualization with Hollywood UI designMost security …

Dealing with a difficult data legacy

Customer call recording and storage is now standard practice across a variety of industries, as well as a Financial Conduct Authority (FCA) requirement in many cases. But …

Five principal cloud security challenges

In our technology driven world, security in the cloud is an issue that should be discussed from the board level all the way down to new employees. CDNetworks takes a look at …

Script injection vulnerability discovered in Salesforce

Elastica discovered an injection vulnerability in Salesforce which opened the door for attackers to use a trusted Salesforce application as a platform to conduct phishing …

Dropbox adds support for FIDO U2F secure authentication

Cloud storage giant Dropbox announced to its 400 million users that it supports FIDO U2F for strong two-factor authentication.Dropbox users can now protect their files with …

Addressing IoT risks with a trust framework

The Online Trust Alliance (OTA) released its Internet of Things Trust Framework, the first global, multi-stakeholder effort to address IoT risks comprehensively.The framework …

Impact and scope of fraud that crosses multiple industries

84 percent of fraud mitigation professionals interviewed by LexisNexis Risk Solutions see fraud that crosses multiple industries in their investigations.Multi-industry fraud …

Insider trading ring hacked into newswire services, raked in $100M based on stolen info

The US Securities and Exchange Commission announced civil fraud charges against 32 defendants for taking part in a scheme to profit from stolen nonpublic information about …

OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography

OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, it provides secure tunneling …

Revisiting takedown wins: Are users in the developing world getting left behind?

We have all seen the headlines: another botnet dismantled, and we can all rest easy that the threat that has been plaguing us for all those years is now no longer an issue. …

Looks like mobile device security is on nobody’s mind

Despite recent high-profile data theft attacks, much of the American workforce has not taken action to protect information on their personal and corporate-issued devices. …

Firefox 40: New features and critical security updates

Mozilla released Firefox 40. The update includes four critical, seven high and two moderate security updates. The new release now issues a warning if you visit a page known to …

Don't miss

Cybersecurity news