Top IoT concerns? Data volumes and network stress
The scaling out to many thousands of devices per organization represents a wealth of new opportunities, according to a report by Quocirca. However, the same security rigor and …
Retailers are unaware of sensitive data leaks
A significant amount of retailers assign the same login credentials to employees and do not know if employees have leaked sensitive data – in spite of the majority …
Flaws in industrial gas detectors exploitable by low-skilled attackers
Two industrial gas detector product lines manufactured by Honeywell sport two remotely exploitable vulnerabilities that can allow an attacker to retrieve the user’s …
Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers
Sijmen Ruwhof, a freelance IT security consultant and ethical hacker from Utrecht, recently stumbled across what turned out to be an example of how poor security practices of …
Exploring the North American cybercriminal underground
Unlike counterparts in other countries, the North American underground encourages cybercriminal activity amongst novices and seasoned pros alike, according to Trend Micro.“The …
Nemesis financial malware kit gains bootkit capabilities, extra stealth
A threat group that steals mostly payment card data from financial services organizations has added a bootkit utility to their malware toolkit. This new capability assures the …
Four critical Android bugs patched, one could lead to permanent device compromise
Google’s December security update for Android has been pushed out to Nexus devices on Monday, and it contains fixes for 19 vulnerabilities, four of which are deemed …
100,000 laptops and phones left in UK bars each year
UK bars guzzle up a staggering 138,000 mobile phones and laptops each year, and alarmingly 64 percent of the devices do not have any security protection installed, which means …
First ever EU rules on cybersecurity
Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid …
“Backstabbing” malware steals mobile backups via infected computers
In this day and age, our mobile devices carry more personal and business information than any other electronic device. Is it any wonder, then, that attackers want to have …
(IN)SECURE Magazine issue 48 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 48 has been released today.Table of contents: Ivan …
Microsoft warns of imminent end of support for all but the latest Internet Explorer versions
Windows users who still prefer Internet Explorer to all other browsers have been urged by Microsoft to update to the latest (and last) version of the browser (v11), as the …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days