
Cyber extortionists hold MySQL databases for ransom
Ransomware has become cyber crooks’ favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of …

The failure of EU’s regulation on cyber-surveillance tech exports
When in April 2016 the Italian Ministry of Economical Progress revoked Hacking Team’s licence to export their Galileo remote control software outside of the EU, it …

Not all threat intelligence is created equal
In this podcast recorded at RSA Conference 2017, John Czupak, CEO at ThreatQuotient, and Jonathan Couch, Senior VP of Strategy at ThreatQuotient, talk about what’s important …

How IoT initiatives impact the IT infrastructure
Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …

Week in review: Mac ransomware, women in infosec, and the death of SHA-1
Here’s an overview of some of last week’s most interesting news, articles and podcasts: The dangers that come with buying pre-owned IoT devices When you buy a …

Which countermeasures improve security and which are a waste of money?
If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. …

New infosec products of the week: February 24, 2017
Security solutions for IoT automotive telematics Building a secure automotive telematics platform to achieve a profitable business model for automakers and ecosystem partners …

Biggest limiting factors to universal adoption of connected devices
After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

New attack sounds death knell for widely used SHA-1 crypto hash function
SHA-1 is definitely, provenly dead, as a group of researchers from CWI Institute in Amsterdam and Google have demonstrated the first practical technique for generating a …

Suspected Deutsche Telekom router hacker arrested
A 29-year-old British national, believed to be the mastermind behind last November’s unsuccessful hijacking attempt of Deutsche Telekom users’ routers, was …

Removing admin rights mitigates most critical Microsoft vulnerabilities
Avecto has analyzed the security bulletins Microsoft released in the past year, and came to an important conclusion: an overwhelming majority of all the critical Microsoft …

Women in infosec: Real-life experiences and challenges
In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC