Please turn on your JavaScript for this page to function normally.
MouseJack
MouseJack: Remote exploitation via radio frequencies

Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …

Japan
Japanese critical infrastructure under targeted attack

Cylance revealed a multi-year, multi-attack campaign against the Japanese critical infrastructure. Their research uncovers how a well-organized and well-funded threat group, …

illusive networks
Attacker View exposes hidden cyber attack paths

Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …

Android
Mobile banking Trojan bypasses Google Play security

The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …

world in hand
Perceptions and buying practices of infosec decision makers

CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In …

AT&T IoT report
Most businesses are considering or implementing IoT

The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …

ecommerce
Ecommerce fraud surges 163%

The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half …

Flashpoint dark web
Deep and Dark Web: Complexity and escalating cybercriminal activity

Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …

architecture
Coalition aims to educate policymakers on cybersecurity

A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …

sign
Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …

money china
IT spending to slow down in 2016

Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …

email
Email security still an afterthought

Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …

Don't miss

Cybersecurity news