Please turn on your JavaScript for this page to function normally.
documents
SWIFT systems of three Indian banks compromised to create fake trade documents

Since last year’s revelation that attackers have compromised SWIFT software of Bangladesh’s central bank and used it to perform fraudulent transfers worth tens of …

Gmail
New Gmail phishing technique fools even tech-savvy users

An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. How the attack unfolds The phishers start by …

password
The most common passwords of 2016

Despite having been predicted many times, the demise of the password as the preferred authentication method is still far off, as it’s difficult to beat its ease of use. …

Redefining the role of security in software development

Software is becoming increasingly important for market success, driving an ever greater need for speed in the development process. The rapid adoption of DevOps is testimony to …

smile
Data Privacy Day reminds digital citizens to better manage their privacy

Many consumers do not fully understand how their information is collected, used and stored by the devices, apps and websites they use every day. According to a recent Pew …

market
Worldwide cloud IT infrastructure market revenue grows 8.1%

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 8.1% year over year to …

San Francisco
Securing the converged cloud: CSA Summit at RSA Conference 2017

The Cloud Security Alliance (CSA) announced the agenda for its annual CSA Summit 2017, a full-day event being held at the RSA Conference 2017 on Monday, February 13, 2017. …

abstract
Week in review: Amazon scammers hijack seller accounts, Shadow Brokers say goodbye

Here’s an overview of some of last week’s most interesting news and articles: Employee burnout: The biggest workplace challenge in 2017 A new study by Kronos and …

Adobe Reader
Adobe quietly bundles data-collecting Chrome extension with latest Reader update

Chrome users who have installed the latest Adobe security updates have also been unknowingly saddled with a browser extension (“Adobe Acrobat”) that can collect some of their …

fire
Mobile forensics firm Cellebrite confirms data breach

Israeli mobile forensics firm Cellebrite has announced that it has suffered a data breach following an unauthorized access to an external web server. “The impacted …

shadow
Shadow Brokers say goodbye, leak a batch of Windows hacking tools

The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …

smart toys
The gift that keeps giving away your data

If you unwrapped a shiny, new connected device this holiday season, it’s likely that you’re in the honeymoon stage, reaping many benefits from your new device. However, this …

Don't miss

Cybersecurity news