Please turn on your JavaScript for this page to function normally.
Week in review: ImageMagick 0day, and why you need a Security Evangelist

Here’s an overview of some of last week’s most interesting news, reviews and articles: Web servers and sites under attack via ImageMagick zero-day flaw The flaw …

Android Trojan pesters victims, won’t take no for an answer

If an app won’t stop badgering you to give it administrator rights to your Android device, chances are you have picked up malware somewhere. Malware peddlers are …

professional
Companies are hungry for professional open source talent

Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …

talk speak speaker
For PoC exploits, go on Twitter

Proof-of-Concept exploits are increasingly being shared and discussed online, threat intelligence firm Recorded Future has discovered. Between March 22, 2015 and the present …

Keyboard
Build security design principles into cyber-physical systems

We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …

Imperva Incapsula DDoS whitepaper
Whitepaper: Protecting financial institutions from DDoS attacks

In response to the growing DDoS threat, the FFIEC issued a statement requiring banks and financial institutions to monitor their networks for DDoS attacks and proactively …

signal
Consumers willing to share personal info for a reward

Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …

Dridex botnet hacked, delivers dummy file

Someone is toying with the Dridex botmasters. The botnet, or at least one or more of its subnets that are sending out spam email delivering Locky ransomware, has been …

botnet
Jaku botnet hides targeted attacks within generic botnet noise

Botnets are usually created by cyber criminals that use them to launch DDoS attacks, deliver spam, effect click fraud. The recently discovered Jaku botnet can effectively do …

danger
Android banking malware may start using adware tricks

Android banking and credential-stealing malware with screen overlay capabilities is on the rise, but for it to be effective, it must detect when banking, email, social media …

binary bomb
Security breaches hit nearly three in four organizations

A troubling 73 percent of organizations have been plagued by at least one security breach or incident in the past year, with about 60 percent of breaches categorized as …

world biohazard
Geopolitical events fuel uptick in region-specific DDoS attacks

An attack research group was the No.1 target of DDoS attacks, and the Middle East region also saw a sharp increase in attacks last quarter, according to Nexusguard. …

Don't miss

Cybersecurity news