Please turn on your JavaScript for this page to function normally.
Telegram
Cybercriminals are turning to Telegram due to its security capabilities

Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and …

iOS biohazard
iOS users are 18x more likely to be phished than to download malware

Phishing is the number one mobile threat affecting organizations. The Wandera’s Phishing Report 2018 shows that iOS users are 18x more likely to be phished than to …

handshake
Why collaboration can be a killer app for defense

In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why …

GDPR
GDPR Rails: Community GDPR compliance tool

Prey Software announced GDPR Rails, an open source tool set designed to help small to mid-sized businesses comply with the General Data Protection Regulation (GDPR). GDPR …

SAP
SAP systems: The threat of insecure configurations

Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …

Android explode
New Rowhammer attack can be used to hack Android devices remotely

Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? …

Twitter
Twitter reveals security blunder, asks users to change their passwords

330 million Twitter users around the world have been urged to change their account password after a glitch resulted in some of them being stored in plaintext format inside the …

face
Which type of biometrics are consumers most comfortable providing?

Consumers feel more comfortable with fingerprint scanning than with other types of biometric technology, including face, eye, voice and other biometric measurements, according …

arrows
The importance of threat intelligence and vulnerability remediation prioritization

In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat …

building blocks
Organizations should not overestimate the short-term benefits of blockchain

Only 1 percent of CIOs indicated any kind of blockchain adoption within their organizations, and only 8 percent of CIOs were in short-term planning or active experimentation …

access
SecBI to support Orange Polska in augmenting its managed security services

SecBI announced an agreement with Orange Polska in the field of network security. The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running …

keys
Crypto flaw in Oracle Access Manager can let attackers pass through

A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account. About the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools