Zeljka Zorz
Being a CISO at a higher education institution
In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …
Use your own encryption keys for Amazon S3 storage
Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …
Microsoft says user content won’t be used for targeted advertising
Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …
Fake, malicious World Cup-themed apps targeting Android users
The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions …
Tool for creating booby-trapped PDFs made public
Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …
The state of GRX security
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …
Automatic updating of Android apps becomes riskier
Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one …
Microsoft battles US search warrant requesting customer emails stored abroad
Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in …
How apps and extensions affect your browsing
Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which …
iOS 8 will randomize devices’ MAC address to increase privacy
The next major release of Apple’s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running …
Payment card breach at US restaurant chain P.F. Chang’s
Asian-themed US restaurant chain P.F. Chang’s China Bistro has apparently suffered a breach that resulted in the theft of customers’ payment card data. The extent …
Crypto-ransomware brings in quite a profit
Crypto-ransomware is quickly becoming cybercrooks’ favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader