Week in review
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …
Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …
Week in review: Researchers hack surgery robot, 5-year-old malware turns Linux servers into spamming machines
Here’s an overview of some of last week’s most interesting news, podcasts and articles:The invasion of biometricsDepending on where you stand biometrics is a good …
Week in review: RSA Conference 2015, security guidance, mobile malware
Here’s an overview of some of last week’s most interesting news and articles. We also have in-depth coverage of RSA Conference 2015, with product releases, news, …
Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches
Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …
Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …
Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion
Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …
Week in review: Hacking air-gapped computers using heat, car hacking, malware threat to virtual currencies
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: New PoS malware family comes with keylogger component Dubbed …
Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks
Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …
Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches
Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …
Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, interviews and articles: A threat assessment of 7 million iOS and Android apps Android malware is …
Featured news
Resources
Don't miss
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?