Cyber threats today: Significant and diverse
Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, according to Accenture. Of those surveyed, 69 percent …
Building a new open standard for cloud-based digital signatures
On July 1, 2016, a new European Union signature regulation (eIDAS) will go into effect, helping pave the way for global adoption of secure digital signatures. Aligned with …
UK banking customers targeted with Retefe Trojan with MitM capabilities
UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …
14 bugs in Uber’s assets revealed sensitive info about drivers, riders
Researchers from consulting and technological audit outfit Integrity have discovered 14 bugs in a variety of Uber’s websites and mobile apps, most of which could reveal …
NASCAR team falls victim to ransomware, pays ransom
Most US businesses would perhaps not pay in the event of a ransomware attack, but Circle-Sport Leavine Family Racing (CSLFR), a professional NASCAR car racing team, is not one …
Cloud security and data privacy laws
In this podcast recorded at Infosecurity Europe 2016, Willy Leichter, VP of Cloud Security at CipherCloud, talks about issues around cloud security and data privacy laws, and …
6 tips to prevent ransomware attacks
Hospital extortions, ransomware for Macs, and more – 2016 appears to be the year of ransomware. This malicious software allows attackers to access your computer, encrypt …
How executives really feel about infosec reports
More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say …
Chrome vulnerability lets attackers steal movies from streaming services
A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion …
Week in review: Hackers targeting healthcare, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Exfiltrating data from air-gapped computers by modulating fan speed For the last few …
FBI doesn’t need a warrant to hack a suspect’s computer, US judge rules
A senior US district judge has decided that the warrant authorizing the search of a suspect’s home computer by the FBI was issued based of probable cause, but even if it …
Exfiltrating data from air-gapped computers by modulating fan speed
For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, …
Featured news
Resources
Don't miss
- Initial access broker pleads guilty to selling access to 50 corporate networks
- Confusion and fear send people to Reddit for cybersecurity advice
- Product showcase: PrivacyHawk for iOS helps users track and remove personal data from data brokers
- Fake browser crash alerts turn Chrome extension into enterprise backdoor
- Law enforcement tracks ransomware group blamed for massive financial losses