Please turn on your JavaScript for this page to function normally.
energy
Defending the smart grid: What security measures to implement

Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …

deep web
The history of cyber attacks: From ancient to modern

In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

light
Data protection and breach readiness guide

The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …

Abstract
A possible future for IoT security

There are many problems with Internet of Things devices, and security is one of the biggest ones. To serve as an example of this important issue, two researchers from …

Review: Automating Open Source Intelligence

Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

wire
There’s no turning back: Say goodbye to the perimeter

If you’ve been following the announcements from this year’s Consumer Electronics Show is Las Vegas, you couldn’t have missed Ford’s partnership announcement with Amazon. …

Google
Review: Google Hacking for Penetration Testers, Third Edition

Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …

Doctor
Cybersecurity recommendations for medical device manufacturers

Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …

sign
Good practice guide on disclosing vulnerabilities

ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …

user
Endpoint security really can improve user experience

Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …

email
How email in transit can be intercepted using DNS hijacking

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on …

business
Key principles for corporate digital responsibility

Businesses’ use of personal data from consumers is at risk and recommends key strategies and principles to properly protect consumer data, build trust and simultaneously grow …

Don't miss

Cybersecurity news