How to keep your browser and devices safe from cryptojackers
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …
Make 2018 your year of taking password security more seriously
The popularity of passwords as a means of authentication is still not waning, so advice on how to opt for passwords that are hard to guess and crack is always timely. Choosing …
Security pros waste 10 hours a week due to inefficient systems
Process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber threats, according to LogRhythm. Over one-third …
Why ransomware? Let’s ask the bad guys
I am involved with ransomware because it is ‘fast, easy, and safe”. This was the feedback we got when we asked the bad guys about the motivations for being involved with this …
Exploits and fileless malware drive record new malware surge
McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware …
Let no endpoint go dark
The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …
Worldwide spending on digital transformation to reach $1.3 trillion in 2018
Worldwide spending on digital transformation (DX) technologies (hardware, software, and services) is expected to be nearly $1.3 trillion in 2018, an increase of 16.8% over the …
Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a …
Attackers disrupt plant operations with ICS-tailored malware
Security researchers from FireEye and Dragos have analyzed and detailed a new piece of malware targeting industrial control systems (ICS). Dubbed “TRITON” and …
New infosec products of the week: December 15, 2017
EventTracker 9: New UI and faster threat hunting EventTracker released a new version of its SIEM, which enables faster threat hunting and simplified compliance auditing. The …
Security company Fox-IT reveals, details MitM attack they suffered in September
Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …
Consumers are ready to say goodbye to passwords
A new survey of 1,000 Americans exploring awareness and perceptions of biometric authentication confirms that consumers continue to have a strong interest in new biometric …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance