High-Tech Bridge named a Cool Vendor by Gartner
High-Tech Bridge has been named a Cool Vendor in Gartner’s May 2017 research “Cool Vendors in Security for Midsize Enterprise 2017” by Adam Hils. High-Tech …
The cost of IoT hacks: Up to 13% of revenue for smaller firms
Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …
Police dismantle organised crime network suspected of online payment scams
The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …
Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web
Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …
What’s really stopping users from adopting secure communication tools?
“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …
US visa applicants will have to provide social media handles
US consular officials have been provided with a new questionnaire that they can give selected visa applicants to complete. Among other things, Form DS-5535 requires applicants …
New Gmail anti-phishing features rely on machine learning
Google has announced several new security features and improvement of existing ones in order to protect Gmail users against phishing emails. New features The new features are …
New infosec products of the week: June 2, 2017
EclecticIQ Platform broadens scope of available cyber threat intelligence The latest version of EclecticIQ Platform, the analyst-centric threat intelligence platform, now …
FTSE companies lack secure data collection methods
With less than a year remaining until the commencement of the GDPR, new research reveals that more than one-third of all public web pages of FTSE 30 companies capturing …
Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …
OneLogin suffers data breach, again
OneLogin, a popular single sign-on service that allows users to access thousands of popular cloud-based apps with just one password, has suffered what seems to be a serious …
Fireball malware infected 250 million computers worldwide
Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online