Week in review
Week in review: Security fatigue, open source jobs, and compromised online shops
Here’s an overview of some of last week’s most interesting news and articles: 100+ online shops compromised with payment data-stealing code Since March 2016 (and …
Week in review: Securing ICS, and the reasons behind risky password practices
Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …
Week in review: Yahoo breach, Tesla remote hijack, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, reviews and articles: Repercussions of the massive Yahoo breach Yahoo has announced on Thursday …
Week in review: MySQL 0-day, Stingrays, and the end of Patch Tuesday
Here’s an overview of some of last week’s most interesting news and articles: Five ways to respond to the ransomware threat While organizations wrestle with the …
Week in review: Stealing login credentials, secure mobile communications explained
Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: Rambler.ru hack: Passwords of nearly 100 million users exposed A …
Week in review: USBee, DNSSEC abuse, and IoT security research
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Linux servers hit with FairWare ransomware – or is it just a scam? Victims …
Week in review: iOS zero-days exploited, hacking cellphone towers and brain implants
Here’s an overview of some of last week’s most interesting news, reviews and articles: Backdoor uses TeamViewer to spy on victims A backdoor Trojan with spying …
Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans
Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …
Week in review: Spoofing boarding pass QR codes, blocking USB-based threats
Here’s an overview of some of last week’s most interesting news, reviews and articles: Malware hidden in digitally signed executables can bypass AV protection …
Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems
Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …
Week in review: Snooping Tor nodes, Wi-Fi keyboards open to keystroke sniffing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Industry collaborates on automotive cybersecurity best practices More than …
Week in review: Pokémon GO, flawed code hooking engines, Ubuntu Forums hacked again
Here’s an overview of some of last week’s most interesting news and articles: Preparing for new EU cybersecurity rules and regulations The Network and Information …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving