
Used devices are a treasure trove of personally identifiable information
40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …

Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Malware posing as Siemens PLC software is hitting industrial environments …

Google to sanction Symantec for misissuing security certificates
In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing …

GoDaddy acquires Sucuri
GoDaddy has entered into an agreement to purchase Sucuri, a provider of website security products and services. Financial details of the transaction were not disclosed. Sucuri …

New infosec products of the week: March 24, 2017
Lookout expands mobile endpoint security solution As a new Apple mobility partner, Lookout is introducing enterprise app review to enable enterprises building their own iOS …

Lack of security patching leaves mobile users exposed
An analysis of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than …

Healthcare IT pros believe data is safer in the cloud
Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer …

Minecraft players get scams instead of mods
Google has recently removed 87 fake Minecraft mods from Google Play, after being notified by researchers about their malicious nature. A partial list of these malicious …

Malware posing as Siemens PLC software is hitting industrial environments
What kind of malware is hitting industrial control systems, and how worried should we and the operators of theses systems actually be? These are question that Ben Miller, …

Java and Flash top list of most outdated programs on users’ PCs
52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

Sushi or pizza? Mac or Windows threat?
Fortinet researchers have made an unusual find: a malicious Word file that is meant to target both OS X and Windows users. As has lately become the norm, when opened, the file …

Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence