Please turn on your JavaScript for this page to function normally.
BYOD
The state of BYOD and mobile device security

Bitglass has released its 2018 BYOD Security Report. The analysis is based on a survey of nearly 400 enterprise IT experts who revealed the state of BYOD and mobile device …

mobile work
Remote working may boost productivity, but also leave you vulnerable to attack

New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public …

work
Working from anywhere, keeping your files in sync and staying secure

Large, modern enterprises strive to achieve maximum productivity, so it’s no wonder most take advantage of the flexibility provided by remote working. People working …

DJI
DJI plugs security flaws that could have enabled access to users’ data and drone images

Researchers at Check Point and DJI today shared details of a potential vulnerability that could have impacted DJI’s infrastructure. Vulnerability impact If exploited, the …

SSD
Self-encrypting SSDs vulnerable to encryption bypass attacks

Researchers have discovered security holes in the hardware encryption implementation of several solid state disks (SSDs) manufactured by Crucial (owned by Micron) and Samsung, …

industrial
USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

classroom
Securing campus networks became more challenging

The results of a global Infoblox survey on the state of network security at higher education institutions reveals that 81 percent of IT professionals believe securing campus …

mobile devices
Mobile security threats: Lack of visibility is putting businesses at risk

A significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks, according to a study conducted by Enterprise …

mobile
How to minimize the negative effect of mobile device loss or theft

Have you, like me, become inordinately obsessed with the security of your smartphone? And are you forever checking your pockets to make sure you haven’t left it behind …

Apple
Apple DEP vulnerability lets attackers access orgs’ resources, info

An authentication weakness in Apple’s ​Device Enrollment Program​ (DEP) may allow attackers to enroll any device into an organization’s Mobile Device Management …

danger
Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new …

hand
Number of smartphone users relying on software-only biometric security to grow 250%

A new report from Juniper Research predicts that the biggest shift in mobile payment security will be the move towards software-based methods, which rely on standard …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools