Week in review
Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …
Week in review: Linux systems ensnared in DDoS botnet and Home Depot breach
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: IT security is a matter of accountability The CEO has always had …
Week in review: PoS security, the Black Hat Arsenal, and securing the U.S. electrical grid
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Securing the U.S. electrical grid The Center for the Study of …
Week in review: Securing networks in the IoT era, and taking control of Android app permissions
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …
Week in review: Hackers don’t worry about repercussions, malware targets iOS devices, Nest thermostat as a spying device
Here’s an overview of some of last week’s most interesting news, interviews, videos, podcasts, reviews and articles: The art and science of detecting emerging …
Week in review: 1.2B Web credentials stolen, Google Search prioritizes HTTPS websites, and how to foil SynoLocker
Here’s an overview of some of last week’s most interesting news, articles and interviews: How secure are today’s critical networks? In this interview, Dr. …
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …
Week in review: Tails 0-days, iOS backdoors, and the psychology of phishing
Here’s an overview of some of last week’s most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The …
Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero
Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …
Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …
Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments