Locky ransomware variant Zepto hits users via email
A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …
Half of SMBs experienced a breach in the past year
More than 50% of SMBs have been breached in the last 12 months, according to a North American study by the the Ponemon Institute. No business is too small to evade a cyber …
Boardroom execs still don’t know the value of data
Almost two thirds of businesses still don’t know the value of critical data assets being targeted by cybercriminals. IRM surveyed security heads at their recent conference, …
Confusion reigns around data protection requirements
Confusion reigns among UK businesses around data protection requirements, according to Delphix. From June 2018, any business that offers goods and services to the EU or …
How online learning algorithms can help improve Android malware detection
A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …
As threats evolve, faster response times are essential
Two thirds of respondents to a global survey by the Business Continuity Institute reported that they had experienced at least one cyber incident during the previous twelve …
Most are unable to control user activity in their IT infrastructure
A majority of organizations report that they lack visibility into their cloud infrastructure, file shares, user activity and mobile devices, greatly impacting data security …
Risks of working with untraceable documents
An overwhelming majority of professionals are dealing with document-related productivity challenges associated with the inability to locate and track documents, control …
Easily exploitable LibreOffice flaw is a godsend for hackers
A serious LibreOffice flaw can be easily exploited by attackers to deliver malware on computers running a vulnerable version of the popular free and open source office suite. …
Windows 10 Anniversary Update brings security improvements
Microsoft has scheduled the release of Windows 10 Anniversary Update for August 2. Aside from new and/or improved tools to aid with productivity, gaming, device set-up, and a …
Rooting Hummer malware brings $500,000 per day to its creator
Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The …
How many businesses will pay a ransom if attacked?
Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits