Please turn on your JavaScript for this page to function normally.
market
Risk analytics market to experience serious growth

The risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to …

explode
Exploit for GNU wget RCE flaw revealed

Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …

IoT
Netherlands, South Korea get nationwide IoT network

In the space of a week, the Netherlands and South Korea got their own, nationwide IoT network. Late last week, Dutch telecom KPN announced that its LoRa (Long Range) network …

TPLINK admin
TP-LINK loses control of two device configuration domains

Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and …

Locky ransomware variant Zepto hits users via email

A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …

hole
Half of SMBs experienced a breach in the past year

More than 50% of SMBs have been breached in the last 12 months, according to a North American study by the the Ponemon Institute. No business is too small to evade a cyber …

businessman
Boardroom execs still don’t know the value of data

Almost two thirds of businesses still don’t know the value of critical data assets being targeted by cybercriminals. IRM surveyed security heads at their recent conference, …

Europe
Confusion reigns around data protection requirements

Confusion reigns among UK businesses around data protection requirements, according to Delphix. From June 2018, any business that offers goods and services to the EU or …

Android Marshmallow
How online learning algorithms can help improve Android malware detection

A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …

speed
As threats evolve, faster response times are essential

Two thirds of respondents to a global survey by the Business Continuity Institute reported that they had experienced at least one cyber incident during the previous twelve …

users
Most are unable to control user activity in their IT infrastructure

A majority of organizations report that they lack visibility into their cloud infrastructure, file shares, user activity and mobile devices, greatly impacting data security …

documents
Risks of working with untraceable documents

An overwhelming majority of professionals are dealing with document-related productivity challenges associated with the inability to locate and track documents, control …

Don't miss

Cybersecurity news