Sharp rise in fileless attacks evading endpoint security
A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. …
Are your enterprise leaders digitally literate?
Only 53 percent of surveyed business technology professionals believe their organization’s leadership is digitally literate, according to ISACA. The other 47 percent either …
How to stop Emotet malware from infecting your computer
The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Latest …
Firefox Quantum: Security and privacy improvements
Mozilla has released Firefox 57, aka Firefox Quantum, and it comes with many performance improvements. It sports a new browsing engine that takes full advantage of the …
Infosec expert viewpoint: IoT security initiatives
IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled …
Bot-driven web traffic and its application security impact
New research conducted by the Ponemon Institute, which focused on such highly targeted industries as retail, healthcare and financial services, exposes the proliferation of …
Mobile devices present a significant risk for GDPR noncompliance
Accessing data from mobile devices presents a significant risk for GDPR noncompliance, according to Lookout. 84 percent of U.S. security and IT executives agree that personal …
Is the healthcare industry prepared to combat evolving cyber threats?
One in four UK healthcare IT professionals aren’t confident in their organisation’s ability to respond to cyberattacks, according to Infoblox. Technology is …
The tools criminals use to prepare a stolen iPhone for resale
Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …
Medigate announces $5.35M seed round to protect connected medical devices
Israeli startup Medigate today announced $5.35 million in seed funding for its mission to secure the use of the millions of connected medical devices on healthcare provider …
Critical flaws open Foscam C1 IP cameras to compromise
Cisco Talos researcher Claudio Bozzato has unearthed a dozen of critical vulnerabilities affecting the Foscam C1 series of indoor HD cameras. The Foscam C1 is one of the most …
Governments manipulate social media, threaten global Internet freedom
Governments around the world are dramatically increasing their efforts to manipulate information on social media, threatening the notion of the Internet as a liberating …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades