Please turn on your JavaScript for this page to function normally.
abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

Wi-Fi
Wi-Fi honeypots: Alive and well at RSAC 2018

It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …

biohazard
Macro-less word document attacks on the rise

WatchGuard released its Internet Security Report for Q4 2017. Among the report’s most notable findings, threat intelligence showed that total malware attacks are up by …

wireless
Four wireless standards hackers will target after Wi-Fi

When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …

envelope
Love letters from a Black Hat to all the fools on the Internet

As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs …

Biohazard
Macro-less malware: The cyclical attack

Last year, attackers linked to the Russian hacking group APT28 (sometimes called Fancy Bear) started hacking like its 1999 with Microsoft Word-based malware that doesn’t …

biohazard
Script-based attacks and overall malware on the rise

Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that …

bot
Will IoT botnets catapult the industry toward security regulation in 2018?

Attackers demonstrated the power of an IoT-fueled botnet in 2016 when the Mirai botnet took down major websites like Reddit, Twitter and GitHub. Despite the damages, no …

Hand
Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

vault
New infosec products of the week​: November 10, 2017

Login to Office 365 with your face Nexus Group is the first authentication app supplier to show off logging in with iPhone X Face ID to digital resources on a computer. The …

Search
Cybercriminals increasingly focusing on credential theft

Criminal tactics used to access user credentials are growing in prevelance, and that a record 47 percent of all malware is new or zero day, and thus able to evade …

GDPR
Confusion and lack of preparation in the face of looming GDPR deadline

With the GDPR deadline set for 25 May next year, many organisations are ill-prepared due to uncertainty about the criteria for compliance. 37 percent of respondents to a …

Don't miss

Cybersecurity news