Unpatchable KeyWe smart lock can be easily picked
A design flaw in the KeyWe smart lock (GKW-2000D), which is mostly used for remote-controlled entry to private residences, can be exploited by attackers to gain access to the …
How to test employee cyber competence through pentesting
Social engineering hacking preys on the vulnerabilities inherent in human psychology. Take the Nigerian (419) scams as an example: the scammer tries to convince the victim to …
78% of people forgot a password in the past 90 days
Passwords are the dominant way online services manage access to our personal and work-related lives. But often times, they’re more of a headache than a security tool. HYPR …
Enterprises reaching a security tool tipping point
A rapid increase in the number of security tools used by large companies is limiting their return on investment while increasing the risk of cyber threats, according to …
How enterprise risk management programs operate in organizations today
More than half of CEOs think their enterprise risk management program (ERM) program is not as effective as it should be, a LogicGate survey reveals. Challenges for enterprise …
December 2019 Patch Tuesday: Microsoft fixes one actively exploited zero-day
For December 2019 Patch Tuesday, Microsoft and Adobe have released the final scheduled security updates for this year, Intel has fixed Plundervolt, and Google has delivered …
Download: 2020 cybersecurity salary survey
The 2020 Cybersecurity Salary Survey provides insight into the details related to cybersecurity compensation. Over 1,500 security professionals completed the survey. Today you …
Microsoft demystifies email attack campaigns targeting organizations
Email is attackers’ preferred method for gaining a foothold into organizations. Campaign views, a new type of report available to some Microsoft enterprise customers, …
The 7 most dangerous digital technology trends
As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service …
It’s the most vulnerable time of the year
With the holiday season upon us, it can be all too easy to get swept up in the festivities. As soon as the Halloween hangover starts to finally wear off, you’re already …
What are the qualities of a good digital identity management program?
Growing consumer expectations, the breakdown of traditional “walls” and emerging technologies are making it hard for organizations to devise a successful digital identity …
BYOD security challenges leave companies at risk
Organizations aren’t moving quickly enough on cybersecurity threats linked to the drive toward using personal mobile devices in the workplace, warns a QUT privacy …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul