Please turn on your JavaScript for this page to function normally.
biohazard
Most businesses don’t inspect cloud services for malware

The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …

burn
SSHowDowN Proxy attacks using IoT devices

Akamai’s Threat Research team has identified a recent spate of SSHowDowN Proxy attacks whereby attackers are using Internet of Things (IoT) devices to remotely generate …

patching cloud
Shadow IT intensifies cloud security risks

Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a …

Avtech IP cameras
130,000 Avtech IP cameras, DVRs can be easily roped into IoT botnets

Security researcher Gergely Eberhardt has unearthed over dozen of vulnerabilities in most IP cameras, NVRs and DVRs by Taiwanese manufacturer Avtech, including things like …

Signal disappearing messages
Signal users can now make their messages disappear

Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

Dawnscanner
Scan Ruby-based apps for security issues with Dawnscanner

Dawnscanner is an open source static analysis scanner designed to review the security of web applications written in Ruby. Dawnscanner’s genesis Its developer, Paolo …

transformation
Identity-centric security: The killer app for digital transformation

Organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to …

GDPR
97 percent of companies don’t have a GDPR plan

Organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the impact of non-compliance on …

mechanics
Deception mechanisms for detecting sophisticated attacks

Private information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including …

Dell SonicWALL Email Security
Four vulnerabilities found in Dell SonicWALL Email Security virtual appliance application

Digital Defense (DDI) disclosed the discovery of four security vulnerabilities found in the Dell SonicWALL Email Security virtual appliance application. The appliance is …

online gaming
Trade of online gaming currencies fuels cybercrime

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro …

Metropolitan Police
ISIS suspect charged with researching encryption, encrypting website

A man from Cardiff, Wales, has been charged with six terrorism-related charges, including one that involves actions that are not usually considered illegal: researching …

Don't miss

Cybersecurity news