Please turn on your JavaScript for this page to function normally.
Apple
OS X zero day bug allows hackers to bypass system integrity protection

An OS X zero day vulnerability could allow attackers to bypass System Integrity Protection, Apple’s newest protection feature, and to escalate their privileges, simplifying …

Java
Emergency Java update plugs system compromise hole

Oracle has issued an emergency security update for Java to plug a critical flaw (CVE-2016-0636) that could be exploited by luring users to visit a web page hosting the …

CCTV
RCE flaw affects DVRs sold by over 70 different vendors

RSA security researcher Rotem Kerner has discovered a remote code execution vulnerability that affects digital video recorders (DVRs) sold by more than 70 different vendors …

world
Evolution of the enterprise managed security services market

In this podcast recorded at RSA Conference 2016, Court Little, Director of Product Management at Solutionary, talks about how the enterprise managed security services market …

money
How tax fraud occurs and how to stay safe

The IRS is now taking up to 21 days to review a tax return. Last year, a similar tax return took seven days to review, according to iovation. This increase of taking up to …

Former US Embassy employee imprisoned for sextortion

Former US State Department employee Michael C. Ford has been sentenced to four years, and nine months in prison for perpetrating a widespread, international e-mail phishing, …

ADAC test
Cheap radio attack can be used to unlock and steal 24 car models

A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …

Windows
How to block malicious macros for good?

Microsoft is finally doing something about the increasing threat of malicious macros: it has added a new feature in Office 2016 that will block macros from loading in certain …

Business ideas
Enhance your security ecosystem with TITUS Illuminate

The amount of data being created, shared and stored is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, …

cables
Network security operations becoming more difficult

One hundred and fifty enterprise IT security professionals from a wide range of industries were surveyed by Enterprise Strategy Group (ESG) to gain a better understanding of …

Tor project
Tor Project exploring ways to keep its software and users safe

In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …

facepalm
Cyber crooks spread Surprise ransomware via TeamViewer

A new ransomware family has been encrypting users’ files and appending the .surprise extension to them. The malware itself doesn’t differ much from other similar …

Don't miss

Cybersecurity news