Please turn on your JavaScript for this page to function normally.
money
Worldwide infosec spending to reach $81.6 billion in 2016

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to the latest forecast from …

eye
Top-level cyber espionage group uncovered after years of stealthy attacks

Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …

Broken glass
Oracle-owned MICROS PoS systems vendor breached

MICROS, the point-of-sale payment systems vendor owned by Oracle, has suffered a data breach, and there are indicators that point to the infamous Carbanak (aka Anunak) …

Qualys
Bringing security into IT and application infrastructures

In this podcast recorded at Black Hat USA 2016, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about a new trend in bringing security into IT …

criminal
1 in 3 Americans report financial losses due to being defrauded

With nearly half of Americans reporting they have been tricked or defrauded, citizens are concerned that the Internet is becoming less safe and want tougher federal and state …

Cloud
Security still the biggest challenge in cloud management

CIOs are the C-suite executives most intensively advocating and driving migration of their organizations’ IT resources to the cloud. A new Unisys study indicates that …

binary bomb
Malware hidden in digitally signed executables can bypass AV protection

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code – all …

Cerber2 ransomware released, no decryption tool available

The author of the widely distributed Cerber ransomware has released a newer version, and files encrypted with Cerber2, unfortunately, can’t be decrypted without paying …

Windows
Remote Butler attack: APT groups’ dream come true

Microsoft security researchers have come up with an extension of the “Evil Maid” attack that allows attackers to bypass local Windows authentication to defeat full …

Spoofing boarding pass QR codes with simple app

Przemek Jaroszewski, the head of Poland’s CERT, says anyone can bypass the security of the automated entrances of airlines’ airport lounges by using a specially …

Android unlocked
New vulnerabilities affect over 900 million Android devices, enable complete control of devices

Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …

Ideas
Four IT trends CIOs need to know about

CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Don't miss

Cybersecurity news