Please turn on your JavaScript for this page to function normally.
Skull
Why ransomware? Let’s ask the bad guys

I am involved with ransomware because it is ‘fast, easy, and safe”. This was the feedback we got when we asked the bad guys about the motivations for being involved with this …

analyst
Five mental shifts we must make to achieve security beyond perimeters

Data centers aren’t exactly going extinct, but given the massive shift to public clouds, you need to make some significant adjustments if your mindset doesn’t already include …

binary
Why cryptography is much harder than software engineers think

The recent ROCA vulnerability (CVE-2017-15361) raises some important issues about the design of secure cryptographic software. The vulnerability is not in this case an obvious …

fire
Exploits and fileless malware drive record new malware surge

McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware …

Absolute dashboard
Let no endpoint go dark

The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …

IoT
Five things CIOs can do as IoT adoption turns into a nightmare

There is no doubt that IoT technology has tremendous potential to improve outcomes for customers and also deliver significant business outcomes. As businesses are increasing …

People
How enterprises must prepare for the tech generation

With fall in full swing, HR departments are being flooded with resumes from new graduates looking to enter the workforce. But this year’s crop of new talent has some key …

money
Worldwide spending on digital transformation to reach $1.3 trillion in 2018

Worldwide spending on digital transformation (DX) technologies (hardware, software, and services) is expected to be nearly $1.3 trillion in 2018, an increase of 16.8% over the …

danger
Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a …

industry
Attackers disrupt plant operations with ICS-tailored malware

Security researchers from FireEye and Dragos have analyzed and detailed a new piece of malware targeting industrial control systems (ICS). Dubbed “TRITON” and …

road
New infosec products of the week​: December 15, 2017

EventTracker 9: New UI and faster threat hunting EventTracker released a new version of its SIEM, which enables faster threat hunting and simplified compliance auditing. The …

Fox IT
Security company Fox-IT reveals, details MitM attack they suffered in September

Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

Don't miss

Cybersecurity news