Please turn on your JavaScript for this page to function normally.
Swann
Swann security cameras vulnerable to spying hack

Researchers have unearthed a security flaw in a Swann security camera that allows attackers to spy on the video and audio feed of anyone’s camera. Swann SWWHD-Intcam is …

Google security
After extensive testing, Google introduces the Titan Security Key

Google recently shared that since it made employees use physical security keys instead of passwords and one-time codes, none of them – and there are over 85,000 – …

healthcare
Securing healthcare organizations: The challenges CISOs face

Healthcare organizations are ideal targets for criminals looking to steal personal and other sensitive information, as the industry is lagging behind when it comes to …

SAP
ERP applications under attack: How criminals target the crown jewels

Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …

phishing
Attackers playing into users’ commitment to security continue to sail through defenses

KnowBe4 shared its Top 10 Global Phishing Email Subject Lines for Q2 2018. The messages in the report are based on simulated phishing tests users received or real-world emails …

bulb
Not many organizations scale their digital initiatives beyond the piloting stage

As organizations continue to embrace digital transformation, they are finding that digital business is not as simple as buying the latest technology — it requires significant …

money
ZDI offers hefty bounties for zero-days in popular web servers, CMSes

The Trend Micro-backed Zero Day Initiative is asking bug hunters to look for zero-day RCE vulnerabilities in several open source server-side products and is ready to pay up to …

Broken glass
72% of CEOs admit they’ve taken intellectual property from a former employer

In a clear demonstration that top executives defy data security best practices and company policy, 72 percent of CEOs admit they’ve taken valuable intellectual property (IP) …

password
Major websites still fail to steer users towards better passwords

The death of passwords is predicted with regular frequency, but we’re still to see it actually happen. It’s possible that it will happen one day but, in the …

fence
Adopting a Zero Trust approach is the best strategy to control access

A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate …

city
Smart cities spending to reach $158 billion in 2022

Smart City initiatives will attract technology investments of more than $81 billion globally in 2018, and spending is set to grow to $158 billion in 2022, according to IDC. …

Bluetooth
Bluetooth vulnerability allows snooping of traffic between paired devices

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …

Don't miss

Cybersecurity news