Please turn on your JavaScript for this page to function normally.
talk
Most employees use unsanctioned group chat tools

Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …

Abstract 7
Spora ransomware could become the new Locky

A recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential …

Oracle
Massive Oracle Critical Patch Update fixes 270 vulnerabilities

Oracle has released the first Critical Patch Update scheduled for 2017, and it’s massive. It fixes 270 vulnerabilities across multiple products, and over 100 of them are …

Apple
Apple’s malware problem is accelerating

For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …

Kali Linux
Kali Linux certification, first official Kali book on the horizon

The Kali Linux distribution celebrates its 10th anniversary this year. The hugely popular open source project, maintained by Offensive Security, announced today that its new …

signature
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

lights
Growing risk associated with mobile and IoT application security

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

shopping
Retailers largely lack on-site security and IT expertise

A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …

Apple
Fruitfly: Unusual Mac backdoor used for tightly targeted attacks?

Researchers have found and analyzed a Mac backdoor that is unusual in many ways. The malware – detected as OSX.Backdoor.Quimitchin by Malwarebytes but dubbed Fruitfly by …

samsung camera
Samsung SmartCam can be easily hijacked

At least one type of Samsung SmartCam cameras can be taken over by remote attackers who just need to know the vulnerable camera’s IP address. The remote code execution …

WhatsApp
UK users bombarded with scammy offers via Facebook, WhatsApp

Since the beginning of the year, survey scammers have mounted a veritable onslaught against Facebook and WhatsApp users from the UK. The lure comes in the form of a fake free …

Car
Open source cybersecurity framework for the automotive industry

A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …

Don't miss

Cybersecurity news