Please turn on your JavaScript for this page to function normally.
DNS Security
Review: DNS Security

About the authors Allan Liska is a Consulting Systems Engineer at FireEye, and Geoffrey Stowe is an Engineering Lead at Palantir Technologies. Inside DNS Security: Defending …

DDoS
Innovation and exploitation fuel DDoS attack landscape

Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …

corporate cloud
Key cloud adoption trends and challenges for government entities

Cloud computing has become a trending topic for federal CIOs in the last few years, according to Netwrix. In response to the Obama administration’s cloud-first …

Market
IoT MSSPs market revenues to top $11 billion in 2021

Industrial applications are set to be the core focus for IoT Managed Security Service Providers (MSSPs) with ABI Research forecasting overall market revenues to increase …

Android
Charger mobile ransomware steals contacts and SMS messages

Check Point’s mobile security researchers have discovered a new ransomware in Google Play, dubbed Charger. Charger was found embedded in an app called EnergyRescue. The …

iPhone, iPad, iOS, Apple
Apple releases security patches for everything, update today!

On Monday, Apple released its latest batch of security patches for macOS, Safari, iOS, watchOS, tvOS, iTunes and iCloud for Windows. The iTunes and iCloud for Windows updates …

Cisco WebEx
Cisco WebEx extension opens Chrome users to drive-by malware attacks

Windows users who have the widely used Cisco WebEx extension installed on Chrome are in danger of getting silently hacked when visiting a malicious website. The vulnerability, …

world
Family dynamics in a connected world

A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …

eye dark
How money-hungry data brokers erode privacy in China

A recent expose by Southern Metropolis Daily, a Chinese daily newspaper known for its investigative reporting, has revealed that random people with enough money at their …

gap
Real-time network health management: Closing the gap between known and unknown threats

2016 was yet another record year for cyber security threats. As of July 2016, there were 522 reported breaches, exposing more than 13 million records, according to the …

industry
Effective ICS cyber defense methods

Cyber defense risks are on the top of concern for every manager operating manufacturing and critical infrastructure. The solutions for protecting the Confidentiality, …

Android malware
Researchers predict upsurge of Android banking malware

Android users, beware: source code and instructions for creating a potent Android banking Trojan have been leaked on a hacker forum, and researchers are expecting an onslaught …

Don't miss

Cybersecurity news