Cyber crooks will go after medical records next
As security firms and law enforcement agencies continue to cooperate and successfully take down botnets, cyber crooks will be forced to look for new and more lucrative …
Netflix users targeted in active tech support scam
Malwarebytes’ security researcher Jerome Segura has recently analyzed a rather creative tech support scam that is actively targeting Netflix users. He doesn’t say …
Cisco offers $300k for IoT security solutions
Cisco has launched a new competition and is calling on “visionaries, innovators, and implementers” to propose practical solutions for issues affecting security of …
D-Link introduces portable 11AC router and charger
D-Link announced that it is now shipping the world’s first portable 11AC router, the Wi-Fi AC750 Portable Router and Charger (DIR-510L). This latest addition to the …
TrustyCon talks made available on video
As announced, the TrustyCon infosec conference, established by security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON and held …
Trends shaping mobile forensics in 2014
Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …
Week in review: Apple patches critical OS X SSL flaw, Mt. Gox goes bankrupt, MS EMET’s protections bypassed
Here’s an overview of some of last week’s most interesting news, reviews and articles: RSA Conference USA 2014 coverage You didn’t make it to this …
A walk through the RSA Conference 2014 expo, part 5
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2014. Featured firms: DigiCert, Trustwave, Cryptomathic, VMware, Tufin, Microsoft.
Quickly identify and act on endpoint security issues
Promisec announced plans for Promisec Integrity, a series of cloud-based offerings to help small-to-medium enterprise organizations with endpoint security and remediation. The …
RSA Conference attendees ambivalent about NSA tactics
Thycotic Software announced the results of a survey of 341 RSA Conference USA 2014 attendees, which found that fewer than half (48%) of pollees feel the NSA overstepped its …
Two of every five CryptoLocker victims pay the ransom
Ransomware is one of the most effective means for cyber crooks to “earn” themselves huge sums of money with practically no effort, which explains its popularity …
Risk Analytics as a Service by Brinqa
Brinqa announced the industry’s first Risk Analytics as a Service offering. “Risk Analytics as a Service is aimed at companies that are struggling to find a …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks