Life Old Windows PCs can stop WannaCry ransomware with new Microsoft patch Redmond publishes patch for Windows XP, Server 2003 and 8 15 May
Blogs Visible measures or real security? Is the laptop ban justified, or just another liquids fiasco? 12 May
Pro Laptops from HP found to be recording keystrokes Conexant audio driver may have accidentally implemented the keylogging function 12 May
Pro New IoT malware targets 100,000 IP cameras via known flaw Malware has emerged exploiting vulnerabilities reported in March 10 May
Life Supply chain attack hits Mac users of HandBrake video converter app Mac users who downloaded the app earlier this month may have their computers infected with the Proton Trojan 9 May
Life Sneaky Gmail phishing attack fools with fake Google Docs app Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts 4 May
Pro Security-as-a-service model gains traction New report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs. 27 Apr
Pro Cyberespionage and ransomware on the rise in new breach report Tenth annual Verizon report shows a major rise in espionage, ransomware and phishing 27 Apr
Life Russian hackers use OAuth, fake Google apps to phish users The phishing schemes can work, in spite of Google's two-step verification, Trend Micro said. 26 Apr
Pro HipChat resets user passwords after possible breach In some cases, messages in chat rooms may have been exposed 25 Apr
Pro A new tool tests for NSA spyware Script detects a related code implant and shows as many as 100,000 systems worldwide may be infected 24 Apr
Pro Rising security risk of the citizen developer Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security? 18 Apr
Life Microsoft fixes 45 flaws, including three actively exploited vulnerabilities Patch Tuesday includes fixes for critical flaws in IE, Edge, Office, Windows and .Net 13 Apr
Pro Detecting insider threats is easier than you think Security experts weigh in on stopping the danger from your own employees 13 Apr
Pro Attacks exploit unpatched vulnerability in Microsoft Word Attackers have been exploiting a zero-day vulnerability in Microsoft Word since January to infect computers with malware 11 Apr
Pro Application ‘rush to release’ causes security risks Nurturing developer talent can help ensure adherence to secure coding practices 10 Apr
Pro GDPR implementation from a cybersecurity perspective Demonstrating security by default may be a tricky prospect 10 Apr
Pro Here’s why virtual CISOs meet a very real business need If a full time officer is not needed, perhaps consider a virtual one 10 Apr
Pro IoT malware exhibits destructive behaviour Researchers have observed attacks against IoT devices that wipe data from infected systems 10 Apr
Pro Apache Struts 2 exploit used to install ransomware on servers Attackers exploit a Struts vulnerability patched in March to install the Cerber ransomware on Windows servers 7 Apr
Pro Cisco issues variety of security warnings on wireless gear Cisco issues one critical warning for vulnerability in Aironet 1830 Series and 1850 Series Access Points 6 Apr
Pro A third of malware is 0-day and missed by legacy AV At least 30% of malware today is new, zero-day instances is missed by traditional antivirus defences, according to a new report 6 Apr
Life US says device ban may expand to more airports Homeland Security secretary says measures might be taken in the "not too distant future" 6 Apr
Pro US privacy rollback can cause headaches for corporate security pros Tracking down Tor users can be a nightmare 5 Apr
Pro Chinese hackers go after data of third-party IT suppliers APT10 hacking group has been blamed for the global cyberespionage campaign 5 Apr
Pro Old attack code is new weapon for Russian hackers Researchers find commonalities between tools used against Solaris 20 years ago and modern-day attacks 4 Apr
Pro Report: Criminals find profit rates of up to 95% with DDoS attacks Unsecured IoT devices help drive down cost of attacks 3 Apr
Pro Google’s Android hacking contest fails to attract exploits $200,000 bounty not enough to tempt researchers 3 Apr
Pro Latest WikiLeaks dump exposes CIA methods to mask malware Whistleblower website claims tools were used last year 3 Apr
Life Apple: Macs and iPhones are safe from newly revealed CIA exploits The iPhone vulnerability patched back in 2009, Mac holes fixed in 2013 27 Mar
Life UK official wants police access to parliament attacker’s WhatsApp messages Khalid Masood reportedly used service before rampage that left five dead 27 Mar
Life Leaked iCloud credentials ‘obtained from third parties’ Apple confident its services haven't been compromised 24 Mar
Pro Double Agent attack can turn antivirus into malware Cybellum researchers say the problem can affects all processes, won’t go away anytime soon 23 Mar
Pro Should organisations be concerned by cyberespionage? Goals, more than techniques, are key in espionage cases 23 Mar
Pro DevOps embraces security measures to build safer software Automating security throughout development lifecycle creates better, safer code 23 Mar
Life UK follows US ban of electronic devices in cabins on some flights No specific terrorist threat cited in announcement 22 Mar
Life US bans electronics larger than smartphones in cabins on certain flights Dept of Homeland Security cites threat of terrorists smuggling explosive devices in various consumer items 21 Mar
Subscribers 0
Fans 0
Followers 0
Followers