How to become a nightmare for cyber attackers
Chris Nickerson, CEO of Lares Consulting, has been a penetration tester for the last 15 year or so. He headed red teams targeting systems and environments known and unknown, …
Companies investing in cloud, security and Big Data are growing faster
Organizations actively using cloud, mobility, big data or security technologies are experiencing up to 53 percent higher revenue growth rates than those that have not invested …
Secure networks are the key to unlocking A2P potential
75% of mobile network operators (MNOs) do not have the measures in place to control and monetize Application-to-Person (A2P) SMS traffic that traverses their network, …
WiFi jamming attacks more simple and cheaper than ever
A security researcher has demonstrated that jamming WiFi, Bluetooth, and Zigbee networks is not difficult to perform but, most importantly, also not as costly as one might …
America’s Thrift Stores breached by Eastern European criminals
America’s Thrift Stores, a for-profit organization that operates thrift stores in Alabama, Georgia, Louisiana, Mississippi and Tennessee, is the victim of a data …
Cybersecurity expectations: Myth and reality
Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online, according to Intercede.The number of …
Compliance vs. cybersecurity: Insurers face competing priorities
Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …
Android ransomware gets new, professional look thanks to Googles Material Design
“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …
Thousands of Zhone SOHO routers can be easily hijacked
Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …
Chinese hackers arrested at US request
Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …
GnuPG 2.1.9 released
The GNU Privacy Guard (GnuPG) is a complete and free implementation of the OpenPGP standard which is commonly abbreviated as PGP. It allows to encrypt and sign data and …
Authentication bypass flaw in Netgear SOHO routers exploited in the wild
A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days