
The transformative impact of cloud adoption
Despite the average company using 1,427 cloud services to upload an average of 18.5 TB of data to cloud applications each month, less than 9 percent of cloud providers are …

35% of websites still using insecure SHA-1 certificates
35 percent of the world’s websites are still using insecure SHA-1 certificates, according to Venafi. This is despite the fact that leading browser providers, such as …

Hybrid cloud storage use to double in next 12 months
The use of hybrid cloud storage will accelerate rapidly over the next 12 months, according to Cloudian. Across 400 organisations surveyed in the UK and USA, 28% already use …

Cross-continental operation brings down payment card fraudsters
On 14 and 15 November 2016, the Finnish National Bureau of Investigation, the Spanish Guardia Civil, the British West Midlands Regional Cyber Crime Unit together with the …

If you’re a cybersecurity professional – this event is for you!
Harness the power of opportunity at RSA Conference 2017. Attending the world’s leading infosecurity event connects you with the biggest ideas and the brightest minds in the …

Week in review: PoisonTap compromises locked computers, how hackers will exploit IoT in 2017
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Researchers reveal WiFi-based mobile password discovery attack A …

Fraudsters accessed Three UK customer database with authorised credentials
Three UK, a telecom and ISP operating in the United Kingdom, has suffered a data breach. According to Three’s status report on the investigation, the attackers were able …

8 million GitHub profiles scraped, data found leaking online
Technology recruitment site GeekedIn has scraped 8 million GitHub profiles and left the information exposed in an unsecured MongoDB database. The backup of the database was …

Firefox Focus: Private iOS browsing made easy
Mozilla has released Firefox Focus, an iOS app that lets you browse the Internet without having to worry who’s tracking your online activity. The app can be used …

Riskiest shopping malls for mobile devices
As the biggest shopping weekend of the year in the US approaches, Skycure is advising shoppers to beware of mobile threats while browsing in both physical and online stores. …

Encryption ransomware hits record levels
The amount of phishing emails containing a form of ransomware grew to 97.25 percent during the third quarter of 2016 up from 92 percent in Q1. PhishMe’s Q3 2016 Malware Review …

New infosec products of the week: November 18, 2016
ThreatQuotient delivers threat intelligence platform for threat operations and management ThreatQ v2 has transformed the threat intelligence platform into a powerful …