Please turn on your JavaScript for this page to function normally.
The latest on the critical RCE Cisco WebEx extension vulnerability

Since Google bug hunter Tavis Ormandy revealed the existence of a remotely exploitable code execution flaw in the Cisco WebEx extension for Google Chrome last week, Cisco has …

fire
Increasingly sophisticated attacks call for advanced protection tools

A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …

tools
Half of IT pros don’t know how to improve their security posture

Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …

fish phishing
Phishers’ new social engineering trick: PDF attachments with malicious links

It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …

Samsung Galaxy S5
Remote attackers can force Samsung Galaxy devices into never-ending reboot loop

A single SMS can force Samsung Galaxy devices into a crash and reboot loop, and leave the owner with no other option than to reset it to factory settings and lose all data …

Facebook security key
Facebook gets physical for safer logins

Facebook has been offering the two factor authentication login option for a while now, and is now trying to make its use easier than ever before. “Most people get their …

money
Are businesses spending their money on the wrong IT security?

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, issued in conjunction with …

building blocks
New infosec products of the week​: January 27, 2017

Prevent DNS-based data exfiltration and detect malware Delivered as a service, Infoblox ActiveTrust Cloud addresses the needs of global enterprises with a mobile workforce and …

transformation
Connected homes and new hacking risks

Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, …

robot
Five emerging technology trends essential to business success

People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society, according to Accenture Technology Vision …

Android unlocked
Can you trust your Android VPN client?

Do you trust your Android VPN client to keep your data secure and your online browsing private? Perhaps you shouldn’t. A group of researchers has analyzed 283 Android …

locks
VirLocker ransomware is back, but can be defeated

VirLocker (aka VirLock, aka VirRansom) is a virulent piece of machine-locking ransomware that has been around for quite some time. It’s actually quite a surprise that it …

Don't miss

Cybersecurity news