Please turn on your JavaScript for this page to function normally.
If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …

Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud

Here’s an overview of some of last week’s most interesting news, interviews and articles: Fighting malware, emerging threats and AI Liran Tancman is the CEO of …

Siemens pushes out emergency SCADA updates

Siemens has released an out-of-band update for the SIMANTIC WinCC SCADA system, which is integrated in its PCS7 distributed control system and its TIA Portal, engineering …

How to evaluate national cyber security strategies

ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an …

How to detect fraudulent activity in a cloud without invading users’ privacy

A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …

Adobe urges users to implement critical out-of-band Flash Player update

For the second time in a month, Adobe has issued a security update for Flash Player. This out-of-band update finally fixes a critical vulnerability that could be misused by …

Most people don’t feel safe when shopping online

Most consumers do not feel safe when shopping online and many are shying away from their favorite retailers as a result, according to the NCC Group. According to the …

The rise of account takeovers

Account takeover fraud is the primary means of attack from fraudsters and attack origins occurring predominantly outside of the U.S., according to NuData Security. Account …

SaaS deployments are now mission critical

Global buyers of cloud applications cite cost, innovation and agility as reasons for adoption. In May and June 2014, Gartner conducted a survey across 10 countries in four …

Regin spy malware was used in Belgacom, EU government hacks

Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it’s likely wielded by the UK spy agency GCHQ and/or the US NSA. The …

New Docker version solves critical bugs, update immediately

If you’re using Docker, the open source platform for building, shipping and running distributed applications on almost any platform, be sure to update to the latest …

Sony Pictures hacked, blackmailed

Apparently, Sony Pictures was hacked. The breach has still not been confirmed by the company, whose only comment so far is that they are “investigating an IT …

Don't miss

Cybersecurity news