Please turn on your JavaScript for this page to function normally.
CIA
How the CIA hacked wireless home routers

For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

tech
New infosec products of the week​: June 16, 2017

Uplevel Systems unveils managed VPN service infrastructure Uplevel Systems has added VPN capabilities to its hybrid managed service platform to help providers differentiate …

artificial intelligence
Perception and reality: The role of AI and automated cyber defenses

Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

skull
Most corporate finance leaders expect to change fraud-fighting strategies

Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

biohazard
US restaurants targeted with fileless malware

Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign …

attack
Whitepaper: Confronting advanced threats as an organization

This whitepaper is no longer available. Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of …

quantum
End-to-end email encryption with no central point of attack

A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based …

puzzle
DevSecOps: Build a bridge between fast and secure software development

Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

fake news
Fake news services and tools proliferate on online markets

Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread and reach its …

Europe
Is Europe ready for GDPR?

What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? Vanson Bourne surveyed 625 IT decision makers in four countries and found that the UK is …

arrest
International operation targets customers of counter anti-virus and crypter services

Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries. The targets are all suspected …

person
Could an independent NGO solve the problem of cyber attack attribution?

Cyber attack attribution is a necessary prerequisite for holding actors accountable for malicious cyber activity, but is notoriously difficult to achieve. Perhaps it’s …

Don't miss

Cybersecurity news