Please turn on your JavaScript for this page to function normally.
93% of SOC managers unable to triage all potential threats

In mid-2016, Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises use SOCs, how they have changed over time, …

Money
Zcash mining software covertly installed on victims’ machines

Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …

arrows
DevSecOps to drive the digital imperative

Dan Hushon, CSC’s CTO, has identified six trends around the philosophy of DevSecOps that company leaders need to be thinking about to drive digital transformation. …

New AirDroid releases fix major security issues

Popular AirDroid remote management tool for Android can now be used without worrying about malicious updates and data theft, its developers claim. What was the problem? Mobile …

Europol
Law enforcement operation targets users of DDoS tools

From 5 to 9 December 2016, Europol and law enforcement authorities from Australia, Belgium, France, Hungary, Lithuania, the Netherlands, Norway, Portugal, Romania, Spain, …

Netgear R700
Critical flaw opens Netgear routers to hijacking

Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …

flames
12 tips for implementing secure business practices

Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to …

code
New minimum code signing requirements for use by all CAs

The Certificate Authority Security Council (CASC), an advocacy group committed to the advancement web security, announced the Code Signing Working Group has released new …

industry
Waterfall Security: Impact of IIoT on cybersecurity

Ten or twenty years ago, the protection of a critical piece of industrial infrastructure meant building a wall around it – or at least a perimeter fence with razor wire on the …

abstract
Week in review: OpenVPN audit, cybersecurity gamification, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The global decline of cybersecurity confidence According to this …

keys
OpenVPN to get two separate security audits

VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …

Thyssen Krupp
Hackers stole technical trade secrets from German steelmaker

German-based ThyssenKrupp, one of the world’s largest steel producers, has announced that it has been the target of a cyber attack. The company said that the attack was …

Don't miss

Cybersecurity news