Please turn on your JavaScript for this page to function normally.
healthcare
Hackers are finding creative ways to target connected medical devices

Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. …

key
Organizations apply stronger PKI security controls due to their increasingly critical role

The Internet of Things is the fastest growing trend driving the deployment of applications that use public key infrastructure as evidenced by the Thales 2018 Global PKI Trends …

The Linux Foundation
Are communications service providers confident in open source networking solutions?

The Linux Foundation announced the results of an industry survey to gauge industry perceptions of open source across networking technologies. Top takeaways from the survey …

alert
LoJax: First-ever UEFI rootkit detected in a cyberattack

ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign …

face
You should prepare for the next mega data breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of …

open source
Downloads of known vulnerable open source components increase 120%

Sonatype today released its fourth annual State of the Software Supply Chain Report, which reveals the widespread use of vulnerable software components by businesses around …

Windows
Most enterprises now running Windows 10, security hygiene no longer optional

Security is galvanizing around the move to Windows 10, the operating system that the majority of companies now run in their organizations, according to the 2018 Enterprise …

hands
Cybersecurity has a diversity problem: Here’s why

I’ve gotten really good at listing really depressing and disheartening stats over the years. It’s not what I want to be good at, but I’ve found that it’s necessary to help …

shark
New tactics subvert traditional security measures and strike organizations of all sizes

Alert Logic released its latest cybersecurity analysis, “Critical Watch Report: The State of Threat Detection 2018,” which shows attackers are gaining vastly greater scale …

businessman
Full compliance with the PCI DSS drops for the first time in six years

After documenting improvements in Payment Card Industry Data Security Standard (PCI DSS) compliance over the past six years (2010 – 2016), Verizon’s 2018 Payment Security …

biohazard
Cryptocurrency mining malware increases 86%

McAfee released its McAfee Labs Threats Report September 2018, examining the growth and trends of new cyber threats in Q2 2018. In the second quarter, they saw the surge in …

eye dark
Poor security behavior still evident in most industry sectors

Security behaviors are poor across most industry sectors in Europe and the Unites States regardless of the employees attitudes towards security. In the largest study on …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools