
The rise of ransom hacks, and the potential impact on your business
The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …

Phishers target Netflix users, ask for info and photo of their ID
Should you send Netflix a selfie in which you hold your ID card to get your account reinstated? The answer is an emphatic no, but each one of us knows at least one person who …

As the cloud’s popularity grows, so does the risk to sensitive data
While the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different …

eBook: 5 emerging rail cybersecurity standards
This eBook is no longer available. With massive capital investments in rail infrastructure and technology, many countries understand that it’s time cybersecurity standards …

Apple updates iOS security guide
Apple has published an updated version of its iOS security guide, in which it details features introduced in iOS 11.2 (released on December 4, 2017) and iOS 11.1 (October 31, …

Google removes 60+ fake game apps displaying porn ads from Google Play
Google has removed some 60+ game apps from Google Play, as they were found to contain code that either delivered inappropriate and pornographic ads, attempted to trick users …

CISOs are feeling less confident than ever about cyber risk and data security
Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …

On-card biometric for contactless payments tested in first commercial pilots
Visa has initiated pilots with Mountain America Credit Union and Bank of Cyprus of a new EMV dual-interface (chip- and contactless-enabled) payment card, making these the …

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection
Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …

Meltdown and Spectre: To patch or to concentrate on attack detection?
Patching to protect machines against Meltdown and Spectre attacks is going slow, and the provided patches, in some instances, lead to more problems than just slowdowns. In …

IoT malware targeting zero-day vulnerabilities
Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was …

Skype users are finally getting end-to-end encryption
The move was announced on Thursday by Open Whisper Systems, the software organization behind the open source Signal Protocol, which has been implemented by Microsoft to offer …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)