
New infosec products of the week: April 7, 2017
A rules engine that adapts to changing attack patterns DataVisor announced the latest addition to its full stack analytics platform, the DataVisor Automated Rules Engine, a …

Extensive shift to hybrid infrastructure services is underway
The growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO) indicate a massive shift toward hybrid infrastructure services, …

How attackers exploit whitelists
If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …

Windows 10 Creators Update will come with clearer privacy options
Nearly two years after Microsoft released Windows 10, the company has finally revealed what data it collects from users. The revelation comes as part of a recent change of the …

“iCloud Mail” phishing emails doing rounds
The latest email phishing campaign targeting Apple users is aimed at gathering as much information as possible from unfortunate victims. The email, made to look like it comes …

Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

23% of security pros are blind to encrypted traffic threats
According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …

Generational differences increase security risks
There are two major IT security risks that enterprises need to prepare for – Millennials and the impending General Data Protection Regulation (GDPR). A global Ponemon …

Most organizations were victims of business email compromise in 2016
Nearly three quarters of corporate treasury and finance professionals said their companies were victims of payments fraud last year, according to the Association for Financial …

Use of digital privacy tools increased in wake of Trump’s ascent to power
Since Edward Snowden’s revelations about the extent of global online and communications surveillance, the issue of privacy of online browsing habits and digital …

US lawmakers propose bill to stop warrantless phone searches at US border
Four US Congressmen have introduced on Tuesday a new law aimed at protecting Americans from warrantless searches of their digital devices when they cross the US border. The …

Tax season security tips: Protect yourself from cybercrime
Between December 2016 and February 2017, IBM X-Force researchers saw a 6,000 percent increase in tax-related spam emails. The researchers see this increase and other factors …
Featured news
Resources
Don't miss
- How agentic AI and non-human identities are transforming cybersecurity
- Even the best safeguards can’t stop LLMs from being fooled
- Wave of tech layoffs leads to more job scams
- PoC exploit for SysAid pre-auth RCE released, upgrade quickly!
- Actively exploited FreeType flaw fixed in Android (CVE-2025-27363)