Please turn on your JavaScript for this page to function normally.
signature
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

lights
Growing risk associated with mobile and IoT application security

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

shopping
Retailers largely lack on-site security and IT expertise

A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …

Apple
Fruitfly: Unusual Mac backdoor used for tightly targeted attacks?

Researchers have found and analyzed a Mac backdoor that is unusual in many ways. The malware – detected as OSX.Backdoor.Quimitchin by Malwarebytes but dubbed Fruitfly by …

samsung camera
Samsung SmartCam can be easily hijacked

At least one type of Samsung SmartCam cameras can be taken over by remote attackers who just need to know the vulnerable camera’s IP address. The remote code execution …

WhatsApp
UK users bombarded with scammy offers via Facebook, WhatsApp

Since the beginning of the year, survey scammers have mounted a veritable onslaught against Facebook and WhatsApp users from the UK. The lure comes in the form of a fake free …

Car
Open source cybersecurity framework for the automotive industry

A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …

architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

hand
82% of executives experienced a fraud incident in the past year

Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …

Head
What resellers think about threats to customers

A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …

smartphone
Organizations to gradually replace physical access cards with smartphones

In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …

RSA Conference Innovation Sandbox
RSA Conference Innovation Sandbox Contest 2017 finalists announced

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

Don't miss

Cybersecurity news