Please turn on your JavaScript for this page to function normally.
snake
Risky sites have never been easier to exploit

46% of the Internet’s top 1 million web sites, as ranked by Alexa, are risky. This is largely due to vulnerable software running on web servers and on underlying ad …

Joomla!
Joomla vulnerability can be exploited to hijack sites, so patch now!

If you’re running a website on Joomla, you should update to the newly released 3.6.5 version as soon as possible – or risk your site being hijacked. The newest …

healthcare
Healthcare IT professionals are overconfident

A Dimensional Research study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a …

backdoor
ENISA says crypto backdoors are a bad idea

“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Office 365
Corporate Office 365 users hit with clever phishing attack

Corporate Office 365 users are being targeted by phishers using a clever new trick to bypass email filters and the default security protections of the Microsoft service. The …

WordPress
DDoS attacks via WordPress now come with encryption

Kaspersky Lab experts have noted an emerging trend – a growth in the number of attacks using encryption. Such attacks are highly effective due to the difficulty in identifying …

users
The rising use of personal identities in the workplace

90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with 68% saying they would …

guarantee
Should security vendors offer product guarantees?

A new Vanson Bourne survey of 500 businesses in the UK, US, France and Germany revealed that nine in ten companies want to see IT security vendors offer a guarantee on their …

smartphone
Consumers regularly share passcodes, creating compromising situations

Consumers keep more and more sensitive personal and professional information on their mobile phones, but most people remain alarmingly casual about adequately protecting that …

Netgear R8000
Netgear pushes out beta firmware for vulnerable router models

Netgear has confirmed that eight of its router models are vulnerable to device hijacking due to a vulnerability that can be easily exploited by remote, unauthenticated …

More Android-powered devices found with Trojans in their firmware

Doctor Web researchers have discovered two types of downloader Trojans that have been incorporated in the firmware of a number of Android-powered devices. Both Trojans are …

attack
McAfee Virus Scan Enterprise opens Linux machines to remote attackers

Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …

Don't miss

Cybersecurity news