Please turn on your JavaScript for this page to function normally.
mask
Attackers opt for discreet methods to spy inside the network

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Most organizations still lack visibility into database assets

Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …

Desk
Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

general virtual digital
Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors

Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he …

encryption
PGP-encrypted comms network allegedly used by criminals shuts down

The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they …

SkullConduct
A password for your eyewear computer: The sound of your skull

Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or …

Opera hand
Opera browser’s VPN is just a proxy, here’s how it works

Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …

lighter
TeslaCrypt: New versions and delivery methods, no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …

industry
The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …

payment card
Increase in credit card leaks with high profile apps and sites

A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …

red wall
IT channel security practices will balance products, processes and skills

A comprehensive security offering is quickly moving from simple product installation to an ongoing process. IT channel companies that highlight processes and education along …

Anomali
Anomali lands $30 million in series C funding

Anomali, the provider of ThreatStream threat intelligence and Anomali Enterprise platforms, has raised $30 million in series C funding. The round, led by Institutional Venture …

Don't miss

Cybersecurity news