Use Chaos Monkey to push engineers to build resilient cloud services
Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …
How cybercriminals attack homes, and how to stop them
At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …
Low GDPR preparedness represents revenue threat
96 percent of companies still do not fully understand the European General Data Protection Regulation (GDPR), despite it coming into effect in May 2018. Elements respondents …
Encryption software market to reach $8.94 billion by 2021
The ecryption software market size is estimated to grow from $3.05 billion in 2016 to $8.94 billion by 2021, at an estimated CAGR of 24.0%, according to MarketsandMarkets. …
MBRFilter: Cisco open sources tool to protect the Master Boot Record
Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …
Cisco plugs critical bug in ASA security devices
Cisco has patched a critical vulnerability in the Identity Firewall feature of Cisco ASA Software, which would allow a remote attacker to execute arbitrary code and obtain …
EU court: Site operators can log visitors’ IP address for protection against attacks
The Court of Justice of the European Union (CJEU) has ruled that the German government can collect and keep IP addresses of visitors to websites operated by German Federal …
Typing while Skyping could leave you vulnerable to eavesdropping
If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at …
Most would stop using digital payments if breached
88% of respondents to a survey conducted by Wakefield Research would stop using digital payments if they personally fell victim to cybercriminal activities as a result of a …
Firmware security: An overlooked threat
An increase in connected devices as part of organizations’ hardware footprint, combined with increasingly inventive attack methods from cybercriminals, has brought firmware …
Smart cities face unique and escalating cyber threats
Ninety-eight percent of respondents to a survey conducted by Dimensional Research consider smart cities at risk for cyber attacks. Smart cities use IT solutions to manage a …
The realities of WiFi troubleshooting
WiFi continues to be the source of serious problems and confusion in enterprise K-12 and higher education. The most common issues reported were WiFi association and WiFi …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform