5 tips to avoid identity theft
“Tax fraud is widespread and happening as you read this,” says security and identity theft expert for Credit Sesame, Neal O’Farrell. “In the first week …
New PoS malware family discovered
A new family of PoS malware has been discovered and analyzed by Trend Micro researchers. They dubbed it PwnPOS, and believe that it has been in used since 2013, possibly even …
US air traffic control system is riddled with vulnerabilities
A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …
Beware of spyware concealed inside games
Monitoring tools can be used for legitimate and malicious purposes. The first category includes parental control and employee monitoring software, the second one screenshot …
FREAK bug breaks SSL encryption for Android and Apple devices
A flaw in OpenSSL and Apple’s Secure Transport implementation of SSL and TLS protocols is putting millions of Android and Apple device users as well as visitors of …
Lepide Software launches LepideMigrator for Exchange
LepideMigrator for Exchange is a one-stop solution that migrates all user mailboxes, public folders and archive mailboxes along with their content and resources from an …
Third-party security now a top business concern
Forrester found that when it comes to tracking third-party risk, critical data loss or exposure (63 percent) and the threat of cyber attacks (62 percent) ranked as the top …
A proactive approach to DDoS attack prevention
The increase in the frequency, volume and sophistication of DDoS attacks has helped boost the awareness of these threats among Asia-Pacific (APAC) enterprises. New analysis …
What’s the most common security threat for an organization?
IT professionals believe their organizations aren’t doing enough to protect critical data and systems, according to Sungard Availability Services. What is triggering …
How directors manage today’s key challenges
A nationwide survey of nearly 500 directors highlighted that daily risk oversight continues to be one of the central challenges facing boards, as well as an increased focus on …
Flaw in GoPro update mechanism reveals users’ Wi-Fi passwords
A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials …
D-Link fixes critical router flaws
D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities. One of these can apparently be exploited by …
Featured news
Resources
Don't miss
- Chaos malware expands from routers to Linux cloud servers
- What managing partners should ask AI vendors before signing any contract
- Anthropic’s new AI model finds and exploits zero-days across every major OS and browser
- Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR
- The case for fixing CWE weakness patterns instead of patching one bug at a time