
If you’re a cybersecurity professional – this event is for you!
Harness the power of opportunity at RSA Conference 2017. Attending the world’s leading infosecurity event connects you with the biggest ideas and the brightest minds in the …

Week in review: PoisonTap compromises locked computers, how hackers will exploit IoT in 2017
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Researchers reveal WiFi-based mobile password discovery attack A …

Fraudsters accessed Three UK customer database with authorised credentials
Three UK, a telecom and ISP operating in the United Kingdom, has suffered a data breach. According to Three’s status report on the investigation, the attackers were able …

8 million GitHub profiles scraped, data found leaking online
Technology recruitment site GeekedIn has scraped 8 million GitHub profiles and left the information exposed in an unsecured MongoDB database. The backup of the database was …

Firefox Focus: Private iOS browsing made easy
Mozilla has released Firefox Focus, an iOS app that lets you browse the Internet without having to worry who’s tracking your online activity. The app can be used …

Riskiest shopping malls for mobile devices
As the biggest shopping weekend of the year in the US approaches, Skycure is advising shoppers to beware of mobile threats while browsing in both physical and online stores. …

Encryption ransomware hits record levels
The amount of phishing emails containing a form of ransomware grew to 97.25 percent during the third quarter of 2016 up from 92 percent in Q1. PhishMe’s Q3 2016 Malware Review …

New infosec products of the week: November 18, 2016
ThreatQuotient delivers threat intelligence platform for threat operations and management ThreatQ v2 has transformed the threat intelligence platform into a powerful …

Top risks identified across private cloud environments
Based on data gathered from over 100 enterprise environments over the past year, a Continuity Software study found that downtime and security risks were present in each cloud …

Business strategy and innovation framework for the industrial IoT
The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …

Low-cost PoisonTap tool can compromise locked computers
A new attack tool devised by security researcher Samy Kamkar will leave you wishing you could take your computer with you everywhere you go. Dubbed PoisonTap, the tool …

Final warning: Popular browsers will soon stop accepting SHA-1 certificates
Starting with Chrome 56, planned to be released to the wider public at the end of January 2017, Google will remove support for SHA-1 certificates. Other browser makers plan to …