Follow on

 
 
lock

Strengthen security during production and development

Applications have become the heart of many businesses, with millions of dollars allocated to their development and millions of dollars in revenue associated with their success. And in the rush to release these applications as quickly as …

phishing

Phishing attacks rise to highest level since 2004

The Anti-Phishing Working Group (APWG) observed more phishing attacks in the first quarter of 2016 than at any other time in history. According to a new report, the total number of unique phishing websites observed in Q1 2016 was a record …

password

Microsoft bans common passwords

If you’re using the Microsoft Account service to sign into the various services offered by the company, and you tried to set up a too commonly used password, you have already witnessed Microsoft’s dynamical banning of common …

cables

IoT security testing and certification program

To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program to provide assurance testing for Internet of Things (IoT) devices and …

 
 

Don't miss

Malware news

Podcasts