
Phishing is a greater threat to users than keyloggers and third-party breaches
When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …

New infosec products of the week: November 10, 2017
Login to Office 365 with your face Nexus Group is the first authentication app supplier to show off logging in with iPhone X Face ID to digital resources on a computer. The …

Eavesdropper vulnerability exposes sensitive corporate communications data
Appthority published research on its discovery of the Eavesdropper vulnerability, caused by developers carelessly hard coding their credentials in mobile applications that use …

Node.js security: Are developers confident in the quality of their code?
A NodeSource and Sqreen joint developer survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in …

Digital business is turning CIOs into leaders
For 82 percent of EMEA CIOs digital business has led to a greater capacity for change and a more open mindset in their IT organization, according to Gartner‘s annual …

Microsoft offers mitigation advice for DDE attacks scenarios
Microsoft has published a security advisorty containing DDE attack mitigation instructions for both users and admins. What’s a DDE attack? For a while now, attackers …

Chrome to start blocking unwanted redirects
“1 out of every 5 feedback reports from Chrome users on desktop mention encountering some type of unwanted content, and we take this feedback seriously when considering …

Connected technologies will accelerate security threats to healthcare industry
Life sciences and healthcare companies will follow the lead of other industries and integrate connected technologies including Internet of Things (IoT) and intelligent …

Top GDPR compliance risks: Breach notification, data mapping, managing consent
The International Association of Privacy Professionals (IAPP) conducted a survey that gauges the perceived risks among privacy professionals of not complying with various …

Top digital transformation challenges? Cybercrime and espionage
In Frost & Sullivan’s recent survey covering end-user perspectives on navigating digital transformation, 54 per cent of IT professionals cited cybercrime and …

The Wild West of drive-by cryptocurrency mining
As more and more Coinhive clones continue popping up, chances of users’ CPU power being hijacked for cryptocurrency mining are rising. According to Malwarebytes’ …

Artful Netflix-themed phishing campaign can fool many
A recently spotted Netflix-themed phishing email campaign is so well crafted that it’s difficult for many less tech-savvy users to spot the scam. Extremely convincing …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility