Week in review
Week in review: Bash Shellshock bug, jQuery.com compromise, and a replacement for TrueCrypt
Here’s an overview of some of last week’s most interesting news and articles: Behavioral analysis and information security In this interview, Kevin Watkins, Chief …
Week in review: Microsoft axes Trustworthy Computing Group, Apple’s new privacy policy, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: (IN)SECURE Magazine issue 43 released (IN)SECURE Magazine is a …
Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …
Week in review: Linux systems ensnared in DDoS botnet and Home Depot breach
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: IT security is a matter of accountability The CEO has always had …
Week in review: PoS security, the Black Hat Arsenal, and securing the U.S. electrical grid
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Securing the U.S. electrical grid The Center for the Study of …
Week in review: Securing networks in the IoT era, and taking control of Android app permissions
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …
Week in review: Hackers don’t worry about repercussions, malware targets iOS devices, Nest thermostat as a spying device
Here’s an overview of some of last week’s most interesting news, interviews, videos, podcasts, reviews and articles: The art and science of detecting emerging …
Week in review: 1.2B Web credentials stolen, Google Search prioritizes HTTPS websites, and how to foil SynoLocker
Here’s an overview of some of last week’s most interesting news, articles and interviews: How secure are today’s critical networks? In this interview, Dr. …
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …
Week in review: Tails 0-days, iOS backdoors, and the psychology of phishing
Here’s an overview of some of last week’s most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The …
Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero
Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …
Featured news
Resources
Don't miss
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats