
Bitcoin traders beware: Fake trading bot offer delivers RAT
As the price of Bitcoin keeps hitting surprising heights, more and more cyber crooks are turning their sights on anything and anyone who trades or uses the popular …

Chrome site isolation option offers more security
Chrome 63, which was promoted to the stable release channel on Wednesday, comes with many security fixes and improvements, especially for the enterprise audience. Site …

Apple users, it’s time for new security updates
Apple usually pushes out security updates for its various devices and software on the same day, but not this time. The iOS update was rushed out on Saturday because of a …

Global security spending to reach $96 billion in 2018
Gartner forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more on security as a …

NiceHash suffers security breach, around $70 million in Bitcoin stolen
NiceHash, one of the most popular crypto-mining marketplaces, has apparently suffered a breach that resulted in the theft of the entire contents of the NiceHash Bitcoin …

What’s on the horizon for security and risk management leaders?
By 2022, cybersecurity ratings will become as important as credit ratings when assessing the risk of business relationships, Gartner analysts believe. They also predict that, …

Why phishers love HTTPS
As more and more sites switch to HTTPS, the number of phishing sites hosted on HTTPS domains is also increasing. “In the third quarter of 2017, we observed nearly a …

Chief Data Officers are increasingly enabling digital transformation
As the role of chief data officer (CDO) continues to gain traction within organizations, a recent survey by Gartner found that these data and analytics leaders are proving to …

DDoS attackers increasingly targeting cryptocurrency exchanges
The extraordinary volatility of the price of bitcoin has spurred speculators to employ a wide variety of tricks to make it swing between extremes, so that they can take …

Majority would trust organisations more if they were to use biometrics for authentication
Nearly seven in 10 Europeans (68 percent) said they would trust organisations more if they were to use biometrics for authentication, according to a new Unisys survey. The …

Hacker who tried to spring friend from jail will end up in prison himself
A Michigan man by the name of Konrads Voits pleaded guilty to hacking Washtenaw County’s computer network and changing the Washtenaw County Jail records, with the intent …

Security and costs holding back those looking to implement IoT projects
While 94% of IT professionals from organisations that are undertaking Internet of Things (IoT) initiatives say they need to invest in IoT over the next 12 months in order to …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility