Please turn on your JavaScript for this page to function normally.
healthcare
Medical devices and the Internet of Things: Defending against cyber threats

More than one-third (35.6 percent) of surveyed professionals in the Internet of Things-connected medical device ecosystem say their organizations have experienced a …

watch
AI is key to speeding up threat detection and response

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …

hands
Enterprise security culture: Why you need it, and how to create it

Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

Gmail
Google wants iOS Gmail users to think twice about following suspicious links

Google has announced the rollout of new anti-phishing checks for the iOS Gmail app: in less than two weeks, all users will be confronted with two warnings if they attempt to …

arrows
Week in review: DNA-based malicious code injection, password power rankings

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New Cerber ransomware variant steals Bitcoin wallets, passwords Here’s a …

DNA
Researchers pull off DNA-based malicious code injection attack

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a …

lights
New infosec products of the week​: August 11, 2017

Forensically sound extraction of public domain social media data Cellebrite has introduced a new UFED Cloud Analyzer solution that provides forensically sound, real-time …

close laptop
Stealthy Mughthesec Mac adware exposed: What it does, how to protect yourself

Mac malware is still a rare occurrence, so it’s no wonder that some of it can lurk, unnoticed for months, on random machines. The latest example falls more in the …

Wi-Fi
Unsecured Wi-Fi hotspots and troubling browsing behaviors

As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ …

Law legislation
PACER vulnerability allowed hackers to access legal docs while sticking others with the bill

A CSRF flaw that made it possible for attackers to access court documents on the PACER system while making legitimate users pay for it has finally been plugged. What is PACER? …

mechanics
The untapped potential of machine learning for detecting fraud

E-commerce fraud protection company Signifyd has recently signed up behavioral analytics expert Long-Ji Lin to fill the position of Chief Scientist. “For advertisers, …

Don't miss

Cybersecurity news