It’s undeniable, IoT will change security forever
Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT) by …
Clever Android ransomware infects tens of thousands of devices
“A new, improved variant of the Android Simplocker ransomware is lurking on third-party app stores. “We estimate that tens of thousands of devices have been …
Cyber crooks opt for APT method for delivering malware
“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …
Major browser makers synchronize end of support for RC4
Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4 cryptographic cypher in the companies’ browsers will end in early …
Popular Android AppLock app full of gaping security holes
AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the device (text messages, photos, videos, etc.). The user decides what content …
0-days found in widely used Belkin router, fixes still unavailable
CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecting the popular Belkin N600 routers, and has offered advice on how users can …
95% of websites in 10 new TLDs are suspicious
Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …
Snoopers’ Charter will cause extreme rise in business costs
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
What’s burning up resources for IT pros during the summer?
IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation. Over the summer months, most organizations see a significant expansion in …
Adware installer gives itself permission to access Mac users’ keychain
“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …
An emerging global threat: BEC scams hitting more and more businesses
As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research