New AirDroid releases fix major security issues
Popular AirDroid remote management tool for Android can now be used without worrying about malicious updates and data theft, its developers claim. What was the problem? Mobile …
Law enforcement operation targets users of DDoS tools
From 5 to 9 December 2016, Europol and law enforcement authorities from Australia, Belgium, France, Hungary, Lithuania, the Netherlands, Norway, Portugal, Romania, Spain, …
Critical flaw opens Netgear routers to hijacking
Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …
12 tips for implementing secure business practices
Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to …
New minimum code signing requirements for use by all CAs
The Certificate Authority Security Council (CASC), an advocacy group committed to the advancement web security, announced the Code Signing Working Group has released new …
Waterfall Security: Impact of IIoT on cybersecurity
Ten or twenty years ago, the protection of a critical piece of industrial infrastructure meant building a wall around it – or at least a perimeter fence with razor wire on the …
Week in review: OpenVPN audit, cybersecurity gamification, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The global decline of cybersecurity confidence According to this …
OpenVPN to get two separate security audits
VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …
Hackers stole technical trade secrets from German steelmaker
German-based ThyssenKrupp, one of the world’s largest steel producers, has announced that it has been the target of a cyber attack. The company said that the attack was …
CISOs must assess risks and identify the real security budget
Organizations spend an average of 5.6 percent of the overall IT budget on IT security and risk management, according to Gartner. However, IT security spending ranges from …
New infosec products of the week: December 9, 2016
Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend …
Exploring data security in the legal sector and beyond
BitSight analyzed the Security Ratings of more than 20,000 organizations in six industries – Finance, Legal, Healthcare, Retail, Government and Energy. The objective was to …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment