
Locky hidden in image file hitting Facebook, LinkedIn users
Malware masquerading as an image file is still spreading on Facebook, LinkedIn, and other social networks. Check Point researchers have apparently discovered how cyber crooks …

New infosec products of the week: November 25, 2016
Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …

UK organisations have a worrying digital security gap
UK organisations reveals that while 82 percent of C-Suite and senior managers admit they are concerned about the vulnerability of their web sites, mobile applications and …

Internet freedom around the world keeps decreasing
For the sixth year in a row, Internet freedom is declining. According to the latest Freedom on the Net report, 67 percent of all Internet users now live in countries where …

Telecrypt Decryptor foils ransomware’s simple encryption method
The recently spotted Telecrypt ransomware can be thwarted: malware analyst Nathan Scott has created a tool that decrypts the encrypted files. Telecrypt Decryptor works only if …

Consumers are still making basic security faux pas online
Security remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, …

Cobalt hackers executed massive, synchronized ATM heists across Europe, Russia
A criminal group dubbed Cobalt is behind synchronized ATM heists that saw machines across Europe, CIS countries (including Russia), and Malaysia being raided simultaneously, …

Unidirectional communications in a bidirectional world
Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from …

Was your data breach an inside job?
Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents …

This year’s most hackable holiday gifts
Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

DDoS protection quiz-based training course
The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. This comprehensive quiz-based training course, …

Michigan State University database with 400,000 student and staff records breached
Michigan State University has announced on Friday that a university server and a database containing information on some 400,000 faculty, staff and students has been accessed …