Deplorable Steam security flaw exploited to hijack prominent accounts
A huge gaping hole that allowed attackers to hijack Steam accounts has been discovered, exploited last week, and finally closed by Valve Corp. this weekend.The attackers …
Most employees don’t understand the value of data
New research from Fujitsu has revealed that only 7% of employees rate their business data higher than their personal information. The results highlight how employees don’t …
Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed
Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposedHere’s an overview of some …
Security flaws discovered in popular Smart Home Hubs
Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …
The Internet of Things is unavoidable, securing it should be a priority
The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now …
OpenSSH bug enables attackers to brute-force their way into poorly configured servers
A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access …
Bug in OS X Yosemite allows attackers to gain root access
Security researcher Stefan Esser has revealed the existence of a privilege escalation vulnerability affecting OS X 10.10 (Yosemite), and has provided a working proof of …
How experts stay safe online and what non-experts can learn from them
Google researchers have asked 231 security experts and 294 web-users who aren’t security experts about their security best practices, and the list of top ones for each group …
Smartwatches: A new and open frontier for attack
Smartwatches with network and communication functionality represent a new and open frontier for cyberattack, according to HP. They found that 100 percent of the tested …
Test your defensive and offensive skills in the eCSI Hacker Playground
BalaBit and Silent Signal today announced that registration is now open for the eCSI Hacker Playground. The hacker challenge is a global online competition, specially designed …
Do CISOs deserve a seat at the leadership table?
A ThreatTrack security survey of C-level executives at U.S. enterprises employing a CISO found that despite a rash of high-profile data breaches in the last year, many in the …
Global managed security services market to reach $29.9 billion by 2020
The global managed security services market is expected to reach $29.9billion by 2020, registering a CAGR of 15.8% during 2014-2020, according to Allied Market Research.The …