
Email and IoT security issues persist
New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …

Fighting sophisticated phishing threats during the digital revolution
In this podcast recorded at RSA Conference 2017, Damien Hugoo, Director of Product Marketing at Easy Solutions, talks about what organizations can do in order to take a …

How can we build a secure IoT world?
We have almost daily proof that the Internet of Things, as it is now, is a minefield of security issues that are just waiting to be exploited. The unfortunate reality is that …

CloudPets connected toys can be turned into remote surveillance devices
The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

Victims of Filecoder ransomware for macOS can now decrypt their files
Last week, researchers discovered and analyzed a new piece of ransomware targeting a specific subset of Mac users: those who are looking for ways to crack legal copies of some …

Operatively-sourced threat intelligence: Using human awareness
In this podcast recorded at RSA Conference 2017, Mike Kirschner, Senior Vice President of Sales and Marketing, Advanced Threat Intelligence at InfoArmor, talks about the …

With 1.2 million phishing attacks, 2016 was a success for cybercriminals
The Anti-Phishing Working Group (APWG) observed that 2016 ended as the worst year for phishing in history. The total number of phishing attacks in 2016 was 1,220,523. This …

Global cloud security market to reach $13.93 billion by 2024
The cloud infrastructure has witnessed a significant growth in recent years and its popularity can be attributed to the on-demand services, scalability and flexibility, and …

Businesses still confused about GDPR
European businesses are still unsure about GDPR – almost 78% of IT decision makers at more than 700 European companies either lacked understanding about the impact of …

ESET antivirus opens Macs to remote code execution
Like any other software, security software is sure to have some vulnerabilities that can be exploited by attackers. The latest in a long list of examples that prove this fact …

Friction matters: Data security lessons from Snapchat and Google
In this podcast recorded at RSA Conference 2017, Grant Shirk and Veliz Perez, Head of Product Marketing and Product Marketing Manager at Vera respectively, talk about how the …

Germans, Czechs served with banking malware through SMS
German and Czech Android users are getting served with a banking Trojan directly through text messages, warns malware researcher Bart Blaze. The message claims that the user …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous