Week in review
Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015
Here’s an overview of some of last week’s most interesting news and articles:Cookie warnings: Useless and bad for security?Our daily clicking away of these …
Week in review: Drone detection, crypto wars, and tracking wearable tech
Here’s an overview of some of last week’s most interesting news and articles:Sniffing and tracking wearable tech and smartphonesResearchers at Context Information …
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …
Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …
Week in review: Researchers hack surgery robot, 5-year-old malware turns Linux servers into spamming machines
Here’s an overview of some of last week’s most interesting news, podcasts and articles:The invasion of biometricsDepending on where you stand biometrics is a good …
Week in review: RSA Conference 2015, security guidance, mobile malware
Here’s an overview of some of last week’s most interesting news and articles. We also have in-depth coverage of RSA Conference 2015, with product releases, news, …
Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches
Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …
Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …
Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion
Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …
Week in review: Hacking air-gapped computers using heat, car hacking, malware threat to virtual currencies
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: New PoS malware family comes with keylogger component Dubbed …
Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks
Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments