Container security for enterprise computing
The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not …
Add IRM, data security and encryption to any app
Vera launched its new IRM-as-a-Service (IRMaaS) product, allowing developers to use Vera’s data security platform to build encryption, tracking, policy enforcement, and …
New alerts for Gmail users targeted by state-sponsored attackers
Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less …
Petya ransomware encrypts files, disks, locks users out of computers
A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot drive’s existing …
Printers all over the US “hacked” to spew anti-Semitic fliers
Andrew “Weev” Auernheimer, one of the two men who were prosecuted and convicted for harvesting e-mails and authentication IDs of 114,000 early-adopters of Apple’s iPad from …
US govt has unlocked San Bernardino gunman’s iPhone
The US Department of Justice has found a way to get into the iPhone 5C owned by Syed Farook, one of the San Bernardino shooters. With a short status report filed with the …
Security and privacy issues in QQ Browser put millions of users at risk
Citizen Lab researchers identified security and privacy issues in QQ Browser, a mobile browser produced by China-based Tencent, which may put millions of users of the …
Web application security with Acunetix
Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as …
Economics of connections will fuel digital business
Business and IT leaders must structure their business and technology investments in a way that will capitalize on the new economic realities of a digital economy, according to …
Facebook testing new features to prevent user harassment
Facebook is testing three new features that should help prevent or at least minimize harassment of users on its platform. The first will alert users if someone tries to …
Advanced Persistent Bot activity on the rise
Bad bots are used by fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, …
7 Iranians indicted for cyber attacks on US banks and a dam
The US Justice Department unsealed on Thursday an indictment charging seven Iranian computer specialists for conducting a coordinated campaign of distributed denial of service …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime