Please turn on your JavaScript for this page to function normally.
Laws, regulations and contracts that infosec pros should be familiar with

If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …

danger
Disttrack wiper malware hits Saudi Arabia’s aviation agency

Shamoon attackers with their Disttrack wiper malware have hit Saudi Arabian entities again. The Saudi government confirmed the latest breaches on Thursday, and for now the …

professional
The global decline of cybersecurity confidence

Tenable Network Security solicited insights from 700 security practitioners in nine countries and across seven industry verticals to calculate a global index score reflecting …

user
Intentional or not, insider threats are real

Despite the perception that hackers are a company’s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important …

email
Most email authentication implementations fail

Most of the world’s largest businesses fail at attempts to use open industry standards to control which email is sent using their names. Three quarters of large …

cloud hand
50% of businesses not leveraging public cloud

While more than 50 percent of respondents are not currently leveraging public cloud, 80 percent plan on migrating more within the next year, according to TriCore Solutions. As …

web
Week in review: Sextortion, Firefox 0-day, and next level red teaming

Here’s an overview of some of last week’s most interesting news, podcasts and articles: McAfee Labs predicts 14 security developments for 2017 Ransomware attacks …

Tesco Bank card
Did Tesco Bank attackers guess victims’ payment card details?

A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …

AirDroid
AirDroid app opens millions of Android users to device compromise

Tens of millions of users of AirDroid, a remote management tool for Android, are vulnerable to man-in-the-middle attacks that could lead to data theft and their devices being …

Eyes
65% of social engineering attacks compromised employee credentials

Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

sign
New infosec products of the week​: December 2, 2016

Trend Micro offers Deep Security as a Service on AWS Marketplace Trend Micro announced the availability of Trend Micro Deep Security as a Service on AWS Marketplace. This new …

cybercrime
Massive cybercrime infrastructure demolished

After more than four years of investigation, the Public Prosecutor’s Office Verden and the Lüneburg Police in cooperation with the US Attorney’s Office for the Western …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools