Basic file deletion increases exposure to security risks
The use of improper data removal methods and the poor enforcement of data retention policies have created the perfect storm for confidential, oftentimes sensitive data to be …
Iris scanning: A secure ID trend for smartphones?
The release of the Samsung Galaxy Note 7 sparked something positive – iris scanning. ABI Research forecasts global shipments of smartphones equipped with iris scanners …
Qualys expands cloud-based offering for security consultants
Qualys unveiled two new packages in its Qualys Consultant suite for independent consultants, auditors and security firms. With these new packages, this suite now offers …
We have to start thinking about cybersecurity in space
With all the difficulties we’ve been having with securing computer systems on Earth, the cybersecurity of space-related technology is surely the last thing on security …
Cisco plugs two Cloud Services Platform system compromise flaws
Cisco has patched two serious vulnerabilities in Cisco Cloud Services Platform 2100, both of which could allow a remote attacker to execute arbitrary code on a targeted …
Spam is once again on the rise
Spam volume is back to mid-2010 heights, and Cisco Talos researchers say that the Necurs botnet is partly to blame. “Many of the host IPs sending Necurs’ spam have …
(IN)SECURE Magazine issue 51 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 51 has been released today. Table of contents …
How ransomware is impacting companies in six major industries
BitSight analyzed the security ratings of nearly 20,000 companies to identify common forms of ransomware and to determine which industries (amongst Finance, Healthcare, …
Organizations sacrificing security for the speed of business
Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, …
Surge in polymorphic attacks and malicious Android apps
Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number …
Fresh Bluetooth Developer Toolkit line tackles IoT security, interoperability
The Bluetooth Special Interest Group (SIG) released several updates to its developer toolkit line-up, which enables developers to build smarter when creating things like …
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research