Guide to application whitelisting
The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining …
Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge
Here’s an overview of some of last week’s most interesting news, interviews and articles:Surviving in the IoT world: Risks of smart home devicesInvestigating some …
Cheap OmniRAT malware used to spy on Android, Windows, Linux, Mac devices
European law enforcement agencies recently targeted users of the DroidJack mobile phone RAT, and likely made other would-be users refrain from buying and using that particular …
Most employees are not malicious, but their carelessness can be just as damaging
The results of a new Loudhouse survey show a disconnect between employees and IT within an organization with 73 percent of U.S. employees believing their company provides …
Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues
Switzerland-based end-to-end encrypted e-mail provider ProtonMail has been on the receiving end of a heavy DDoS attack since Tuesday, November 3, and unavailable to its users …
A new, streamlined version of Cryptowall is doing rounds
Cryptowall 4 (although the number is not mentioned in the new, changed ransom note) is not drastically different from version 3. According to malware researcher Nathan Scott, …
Surviving in the IoT world: Risks of smart home devices
Investigating some of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious threats to the connected home. These include a …
It’s official! People want a more trustworthy Internet
As part of a major research effort, the National Cable & Telecommunications Association (NCTA) unveiled cumulative data from their online survey of more than 100,000 …
IT priorities are changing: Cloud-first strategy to rise
Bitglass conducted an survey of nearly 100 IT leaders attending the Gartner Symposium IT Expo in Orlando, Fla. to better understand their top challenges for 2016 and how they …
Sale of legitimate code-signing certs booms on darknet markets
In the underground cybercrime economy, many players have specialized in one or two skills and services. It should come as no surprise, then, that some have become experts at …
Trojanized versions of 20,000 popular apps found secretly rooting Android devices
Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …
90% of directors believe regulators should hold firms liable for hacks
A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise