Please turn on your JavaScript for this page to function normally.
Solutionary report
88% of all ransomware is detected in the healthcare industry

Solutionary found that companies in the healthcare industry had the most ransomware present, accounting for 88 percent of all ransomware detections in Q2. In addition, …

Headache
How cybersecurity mismanagement can destroy value

Cyber security remains a critical business challenge and a growing concern with a potentially devastating impact on company brands and bottom lines. Despite these damaging …

DDoS
DDoS attacks increase 83%, Russia top victim

DDoS attacks increased 83 percent to more than 182,900 attacks in the second quarter of the year, according to Nexusguard. The newest report shows that Russia has become the …

KeySniffer
Low-cost wireless keyboards open to keystroke sniffing and injection attacks

Bastille Networks researcher Marc Newlin has discovered a set of security vulnerabilities in low-cost wireless keyboards that could be exploited to collect all passwords, …

modem router
50+ vulnerabilities found in popular home gateway modems/routers

Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by …

https
Amazon Silk browser removes Google’s default encryption

Google’s good intentions of keeping searches made via its search engine protected through default encryption have been stymied by Amazon. A bug in the Amazon Silk …

cloud
Only a third of sensitive data stored in cloud-based applications is encrypted

Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive …

Windows UAC alert
UAC bypass attack on Windows 10 allows malicious DLL loading

Security researchers Matt Graeber and Matt Nelson have discovered a way to run a malicious DLL on Windows 10 without the User Account Control (UAC) springing into action and …

chess
What a Chief Strategy Officer does, and why you need one

Seasoned IT security expert and former Gartner analyst Richard Stiennon recently became the Chief Strategy Officer for the Blancco Technology Group. It was the perfect …

tor
Researchers discover 110 snooping Tor nodes

In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …

Critical holes in Micro Focus Filr found, plugged

Popular enterprise file management and collaborative file sharing solution Micro Focus Filr sports half a dozen security flaws, most of which can be exploited – either …

skull
Law enforcement and IT security companies join forces to fight ransomware

Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …

Don't miss

Cybersecurity news