Apple releases security updates, adds new privacy protection for iOS users
Apple has released new versions of its many operating systems and software products, with fixes for a wide variety of vulnerabilities. The iOS update also comes with USB …
Businesses collect more data than they can handle, only half know where sensitive data is stored
With pressure to ensure consumer data is protected mounting, Gemalto today released the results of a global study which reveals that 65% are unable to analyze all the data …
Fitness app Polar Flow reveals home addresses of soldiers, spies
Polar Flow can reveal sensitive information about the lives of users, including intelligence agents, embassy workers, military men and women, workers at nuclear weapons …
German web hosting firm DomainFactory suffers data breach
DomainFactory, one of the largest web hosting companies in Germany, has suffered a data breach. The breach dates back to January 29, 2018, and the attacker had access to the …
UK govt announces specialized cybercrime court in London
It is just a matter of time until specialized courts for cybercrime cases pop up, and the UK is already working on one. The new court will be located in the heart of the City …
WP Security Audit Log: Keeping a watchful eye on your WordPress sites
WordPress is, without a doubt, the most popular website management system in use. The latest statistics put the number of websites running on WordPress over 60 million, and …
Android devices with pre-installed malware sold in developing markets
New low-end Android smartphone devices being sold to consumers in developing markets, many of whom are coming online for the first time, contain pre-installed malware, …
Week in review: New LTE attacks, common API vulnerabilities, risk management trends
Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to …
New insider attack steals passwords by reading thermal energy from keyboards
After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently …
Dramatic increase in cryptocurrency money laundering
Three times more cryptocurrency was stolen from exchanges in the first half of 2018 than in all of 2017, according to CipherTrace. These dirty funds all need to be …
Global revenue from the IoT and analytics for utilities market is expected to grow
The utilities industry is attempting to leverage a plethora of generating assets, transmission and distribution system equipment, and smart meters connected to the grid, …
Check your printers for leftover GDPR-regulated PII
Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition