Please turn on your JavaScript for this page to function normally.
payment card
Nearly 1 in 3 consumers victimized by card fraud

Thirty percent of consumers globally have experienced card fraud in the past five years, according to ACI Worldwide and Aite Group. The global fraud study of more than 6,000 …

euro
GDPR could create $320 billion in fines

Unsurprisingly, many consumer products organisations are taking risks with the security and privacy of their customer data. They are failing to put in place proper processes …

3d printing
Cybersecurity risks in 3D printing

3D printing (i.e. additive manufacturing) is a $4 billion business set to quadruple by 2020. Additive manufacturing builds a product from a computer assisted design (CAD) file …

bug
Microsoft splats bug that turns printers into drive-by exploit kits

In this month’s Patch Tuesday, Microsoft has released 11 sets of patches – 6 “critical” and 5 “important.” The good news is that none of …

FCA US
Fiat Chrysler Automobiles launches bug bounty program

The convergence of connectivity technology and the automotive industry is creating a more enjoyable driving experience. Features such as self-diagnostics, keyless entry and …

biohazard energy
Malware offers backdoor to critical infrastructure targets

SentinelOne Labs has discovered a new form of malware, which has already infected at least one European energy company. The malware, dubbed SFG, is the mother ship of an …

IoT
The explosive growth of the IoT security market

The IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets. The major forces …

key
Shard: Open source tool checks for password re-use

Security researcher Philip O’Keefe has created a tool that allows users to check whether they have reused a password on multiple accounts. The impetus behind the …

anti-ransomware
Researchers create effective anti-ransomware solution

Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most …

Pokemon GO
Pokémon GO gets full access to players’ Google account

Pokémon GO, the mobile augmented reality game that has become hugely popular in record time, brings with it a lot of unexpected dangers. Its popularity has been exploited by …

Vivaldi browser
Why the Vivaldi browser wants you to control everything

The number of Internet users has been growing steadily, and now stands at nearly 3.5 billion. And despite the growing popularity of mobile devices and specialized apps, the …

91.1% of ICS hosts have vulnerabilities that can be exploited remotely

To minimize the possibility of a cyber attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However this is not always the …

Don't miss

Cybersecurity news