Security CLTRe Toolkit: Build and improve security culture
Norwegian security culture startup CLTRe has announced today at CeBIT its Security CLTRe Toolkit. The SaaS-based toolkit will provide organizations from SMEs to large …
Malvertising campaign hits MSN.com, NY Times, BBC, AOL
In the last couple of days, visitors of a number of highly popular websites have been targeted with malicious adverts that attempted to install malware (mostly ransomware, but …
How a digital pathology solution secures patient data
Dutch tech company Philips recently announced that its digital pathology solutions have been certified for compliance with the U.S. Department of Defense (DoD) security …
The power to immediately counter data theft with Matchlight from Terbium Labs
In June 2015, Terbium Labs launched Matchlight, a first-of-its-kind data intelligence system used to find stolen enterprise data on the dark web within minutes of it …
Hack Chromebook in guest mode, get $100,000
Google has once again upped the ante for bug hunters concentrating on Chrome, and is now offering $100,000 to anyone capable of achieving a compromise of a Chromebook or …
Cloud Status: Free app for cloud infrastructure monitoring
Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …
Hotel replaces light switches with insecure Android tablets
Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …
Code.org website leaked volunteers’ email addresses
Code.org, the non-profit organization dedicated to increasing diversity in computer science, has admitted its website has been leaking volunteer email addresses. The discovery …
Bug in surveillance app opens Netgear NAS systems to compromise
A security vulnerability in the ReadyNAS Surveillance Application can be exploited by unauthenticated, remote attackers to gain root access to Netgear NAS systems, Sysdream …
Why outsource risk management to people who don’t care?
The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list …
Security concerns limit business initiatives
Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …
Week in review: First OS X ransomware, hacking Internet-connected trucks, CVE system problems
Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: OS X ransomware found bundled with legitimate software Palo Alto …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS