Please turn on your JavaScript for this page to function normally.
Tapplock
Researcher hacks smart fingerprint padlock in mere seconds

The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a …

blockchain
Don’t start the blockchain revolution without making security a top priority

McAfee released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies, and asserts the necessity of making cybersecurity a top …

person
Europe and Russia home to half of credential theft victims worldwide

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

DDoS
DNS amplification attacks double in Q1 2018

DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. …

IoT
IoT connections to grow 140%, will reach 50 billion by 2022

New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …

cloud
Compliance worries prevent greater cloud use

New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …

Dixons Carphone
Dixons Carphone breach: Personal and payment card info compromised

Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …

Windows 10 patch
Overview: Microsoft June 2018 Patch Tuesday

It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …

Google Chrome
Google removes inline installation option for Chrome extensions

Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement …

user
Zero Trust Security: Never trust, always verify

Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …

money
Has paying the ransom become business as usual?

Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported …

server
Cost of lagging DevOps and microservice enablement? $34 million per year

Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are …

Don't miss

Cybersecurity news