Expert corner

 
 
(IN)SECURE Magazine
CIA

How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks. The Brutal Kangaroo project The agency would …

network

New infosec products of the week​: June 23, 2017

API Behavioral Security: Detecting and blocking attacks targeting API infrastructures Elastic Beam unveiled its flagship solution, API Behavioral Security (ABS), the first AI-powered software platform able to detect and block cyberattacks that …

BEC scams

Internet crime: The continuing rise of the BEC scam

Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the appropriate law enforcement agencies (both in and outside the US) to …

hand

Fostering a safe place for businesses to work in

It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. Through driving productivity, empowering staff and creating engaging …

Don't miss

Malware news

Infosecurity Europe 2017

 
(IN)SECURE Magazine