
Cybercriminals are adopting corporate best practices
Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …

How to prepare for your first infosec job hunt
You’re new to the information security industry and you’re wondering what to expect during an interview. A quick online search will bring up horror stories …

Attacks are driving cloud security market growth
The global cloud security market is expected to grow at a CAGR of over 20% until 2019, according to Technavio. “A key reason for the adoption of cloud security is the sudden …

Documentaries about an expert convicted of leaking classified information
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …

Petya ransomware encryption has been cracked
Petya ransomware hit companies hard, but the good news is that there are now tools available to get the encrypted files and locked computers back. The ransomware not only …

Bug in OS X Messages client exposes messages, attachments
When in March Apple pushed out security updates for its many products, much attention has been given to a zero-day bug discovered by a team of Johns Hopkins University …

Google’s poor design decision undermines 2FA protection
A design decision by Google can be exploited by attackers to gain control of both devices needed to access users’ accounts protected via SMS-based 2-factor …

Million-plus sites hosted on WordPress.com get free SSL
Friday brought some very good news for existing and future owners of sites hosted on WordPress.com: they will be getting HTTPS protection without having to pay for an SSL …

The inconvenient truth about API security
Ovum Consulting asked IT and security professionals across a variety of industries globally about their use of APIs, adoption of API management platforms, and the security …

Are your vendors leaving you vulnerable?
Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …

Week in review: Panama Papers, dark web mapping, WhatsApp end-to-end encryption
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Panama Papers breach was the result of lax security practices? News items …

Beware of phishing emails sporting your home address!
The latest (likely very successful) ransomware delivery campaign takes the form of spear-phishing emails targeting specific individuals and, for added credibility, includes …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool