Please turn on your JavaScript for this page to function normally.
New Docker version solves critical bugs, update immediately

If you’re using Docker, the open source platform for building, shipping and running distributed applications on almost any platform, be sure to update to the latest …

Sony Pictures hacked, blackmailed

Apparently, Sony Pictures was hacked. The breach has still not been confirmed by the company, whose only comment so far is that they are “investigating an IT …

Why you should protect your wireless connection

It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …

ISO 27001: An overview of ISMS implementation process

Register for this webinar to learn: Family of ISO 27k standards – for what purpose should each standard be used 17 steps towards ISO 27001 certification Key benefits and …

Hacking RFID payment cards made possible with Android app

We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the …

Scammers used fake product listings to steal from Walmart

On November 13, US retailer Walmart announced that they will officially start matching the price for items which are also sold for a lower price by online retailers. Less than …

Tips to avoid online scammers this holiday season

With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to …

Regin backdoor: Sophisticated, stealthy, state-sponsored?

Symantec researchers are warning about a new, complex cyber espionage tool that has been around for years and that has likely been created and is wielded by a nation state. …

Black Friday and Cyber Monday will put retailers under pressure

Retailers are currently preparing themselves for two very busy shopping days. Black Friday (28th November 2014) and Cyber Monday (1st December 2014) will see shoppers spend …

Fighting malware, emerging threats and AI

Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …

ENISA guidelines on cryptographic solutions

ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …

Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption

Here’s an overview of some of last week’s most interesting news and articles: The evolution of threat detection and Big Data Mark Gazit is the CEO of ThetaRay, a …

Don't miss

Cybersecurity news