Please turn on your JavaScript for this page to function normally.
door
How security pros look at encryption backdoors

The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of …

Skull
NotPetya aftermath: Companies lost hundreds of millions

The infamous NotPetya ransomware attack, which started in Ukraine on June 27 but later spread to many international businesses, has resulted in huge monetary losses for the …

Samsung
How to spot malicious mobile apps

The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. …

crowd
The human point: Gaining visibility into the context behind user actions

In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward …

icosahedral
DevOps skills gap: Do you have the necessary skills to succeed?

New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating …

Chrome
Google Chrome remote code execution flaw detailed, PoC released

Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] …

Three megatrends that will drive digital business into the next decade

Gartner revealed three distinct megatrends that will enable businesses to survive and thrive in the digital economy over the next five to 10 years. Artificial intelligence …

WordPress
EV ransomware is targeting WordPress sites

WordPress security outfit Wordfence has flagged several attempts by attackers to upload ransomware that provides them with the ability to encrypt a WordPress website’s files. …

Trump
DOJ wants to know who visited anti-Trump website

The US Department of Justice wants DreamHost to hand over IP addresses of some 1.3 million visitors to disruptj20.org, a website that helped organize political protests during …

Uber
Uber to get privacy audit every two years

Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by …

IoT world
US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch …

Money
Worldwide information security spending will grow 7% in 2017

Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 …

Don't miss

Cybersecurity news