
Cybercriminals evolving their tactics to exploit collective human interest
Phishing activity increased significantly in the first few months of 2020, taking advantage of pandemic-induced product shortages and increased usage of streaming services, …
TP-Link Deco X68 with Tri-Band Wi-Fi 6 eliminates weak signals areas with whole-home coverage
TP-Link introduced the Deco AX3600 Tri-Band WiFi 6 Mesh System (Deco X68). TP-Link’s Deco X68 provides robust and reliable Tri-Band Wi-Fi 6 coverage combined with mesh …

ioXt Alliance expands its Compliance Program to bring transparency to mobile apps and VPNs
The ioXt Alliance announced that it is expanding its ioXt Compliance Program with a new mobile application profile with added requirements for VPN applications. Defined …

Cybersecurity threats and cybercrime trends of 2020
Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. “Our 2020 findings depict consumers under constant …
Zimperium partners with Oracle to help enterprises combat advanced mobile threats
Zimperium announced that it is collaborating with Oracle to offer Zimperium’s mobile threat defense (MTD) solutions on Oracle Cloud Infrastructure (OCI). The two companies are …

Fleeceware apps extract hundreds of dollars per year from their users through subscription services
Avast has discovered more than 200 new fleeceware applications on the Apple App Store and the Google PlayStore. The apps have been downloaded approximately one billion times …
Avatier for ServiceNow adds unified, passwordless approach to IAM with SSO
Avatier Corporation has released Avatier for ServiceNow, the latest addition to the Avatier Anywhere platform. Avatier for ServiceNow modernizes workforce collaboration by …

Researchers propose more secure and private mobile contact tracing
For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …
Qualys expands VMDR to mobile devices with support for Android and iOS/iPadOS
Qualys announced it is expanding Qualys VMDR (Vulnerability Management, Detection and Response) to mobile devices with support for Android and iOS/iPadOS delivering an …
Verimatrix launches enhanced Application Protection service for Android
Verimatrix announced general availability of version 2.2 of the Verimatrix Application Protection service for Android. The company’s latest Code Protection service for Android …

40% of COVID-19 contact tracing apps lack basic protections
Guardsquare announced the release of a report which reassesses the levels of security protections and privacy risks of COVID-19 contact tracing apps. The report found that of …

The security consequences of massive change in how we work
Organizations underwent an unprecedented IT change this year amid a massive shift to remote work, accelerating adoption of cloud technology, Duo Security reveals. The security …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence