Please turn on your JavaScript for this page to function normally.
IoT
Leaked: Source code for Mirai IoT DDoS botnet

IoT-powered DDoS attacks are on the rise, and the situation is poised to become even worse now that the source code for the Mirai malware has been made public. Reporter Brian …

nmap
Nmap 7.30: New NSE scripts, Npcap, fingerprints

Nmap 7.30 is the first stable release since 7.12 back in March. Apart from bug fixes, it comes with new features, including more NSE scripts, an improved version of Npcap …

abstract
Digital disruptors demand a new approach to IT

Digital disruptors such as algorithms, artificial intelligence (AI), bots and chatbots are already transforming businesses. Gartner expects that algorithmic business will …

IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling

The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …

world in hand
Week in review: Securing ICS, and the reasons behind risky password practices

Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …

mask
DefecTor: DNS-enhanced correlation attacks against Tor users

A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …

Arduino ESLOV IoT
Arduino’s new open source kit makes creating IoT devices easy

The Arduino team is using Kickstarter to crowdfund their latest project: the ESLOV IoT Invention Kit. ESLOV is a system of intelligent modules that can be connected in an …

user
1 in 3 organizations have experienced an insider attack in the last year

A new Bitglass report on insider threats in the enterprise found that, in a third of organizations surveyed, careless or malicious user behavior resulted in data leakage, up …

server
Security appliance market shows positive growth

The total security appliance market showed positive year-over-year growth in both vendor revenue and unit shipments for the second quarter of 2016, according to IDC. Worldwide …

cloud computing
Boardroom perspectives on cloud implementation

Although there’s a significant uptick in cloud adoption at the enterprise level, companies are missing the full benefit of their cloud adoptions by not factoring their IT …

Yahoo
Yahoo breach was not state-sponsored, researchers claim

The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat …

D-Link DWR-932
D-Link DWR-932 router is chock-full of security holes

Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities affecting the LTE router/portable wireless hotspot D-Link DWR-932. Among these are backdoor …

Don't miss

Cybersecurity news