Please turn on your JavaScript for this page to function normally.
building blocks
Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

airplane
Get ready for a surge in online travel fraud

Unsurprisingly, transactions for booking flights, hotels and rental cars increase significantly over the summer months. In addition, fraudulent activity against online travel …

CLTRe
Assess, build and improve security culture with CLTRe

Norwegian security startup CLTRe announced a new product series, enhancing its existing Saas offering, the Security Culture Toolkit. This new range consists of CLTRe Control, …

Adobe Flash
Fix for actively exploited Flash Player 0day is out, patch ASAP!

Adobe has issued a patch for the Plash Player zero-day vulnerability (CVE-2016-4171) that is actively exploited by the ScarCruft APT group. The bug, discovered by Anton Ivanov …

Facebook
How attackers can hijack your Facebook account

Positive Technologies researchers have demonstrated that knowing a user’s phone number and how to exploit a vulnerability in the SS7 network is enough to hijack that …

terminal
Microsoft creates Checked C extension to prevent common coding errors

Fixing vulnerabilities in completed software and systems is all good and well, but with Checked C, an extension for the C programming language, Microsoft researchers want to …

cisco small business router
Cisco’s small business Wi-Fi routers open to attack, no patch available

Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …

Report: The changing face of hacking
Hacker Guccifer 2.0 claims DNC hack, leaks documents to prove it

An individual that goes by the handle “Guccifer 2.0” has claimed responsibility for the US Democratic National Committee (DNC) hack, and has released documents …

dollar
The average cost of a data breach is now $4 million

The average data breach cost has grown to $4 million, representing a 29 percent increase since 2013, according to the Ponemon Institute. Cybersecurity incidents continue to …

Pestudio
Pestudio: Initial malware assessment made simple

Malicious executables often attempt to hide their behavior and evade detection. By doing so, they present anomalies and suspicious patterns. Pestudio is a free tool that …

Abstract
75% of organizations have serious cybersecurity risk exposure

Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …

IoT
Can you see and control IoT devices on your network?

While the majority of IT pros acknowledge the growing number of IoT devices on their networks, they are unaware of how to properly secure them, according to ForeScout. The …

Don't miss

Cybersecurity news