
Hyperconverged infrastructure adoption is accelerating
The hyperconverged infrastructure is increasingly being adopted by enterprise and midmarket companies to reduce data center costs and improve operational efficiency, according …

Week in review: Smart TV ransomware, DNC hack, and DAO under attack
Here’s an overview of some of last week’s most interesting news and articles: Ransomware targets Android smart TVs If you own a Sharp and Philips smart TV running …

The DAO is under attack, a third of its ether reserves stolen
The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …

50% of ads on free livestreaming websites are malicious
Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU …

GitHub accounts compromised in wake of reused password attack
Three days ago, an unknown attacker has been spotted trying to break into a large number of GitHub accounts and has managed to access some of them, Shawn Davenport, Vice …

Top 10 technologies for information security and their implications
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

Get ready for a surge in online travel fraud
Unsurprisingly, transactions for booking flights, hotels and rental cars increase significantly over the summer months. In addition, fraudulent activity against online travel …

Assess, build and improve security culture with CLTRe
Norwegian security startup CLTRe announced a new product series, enhancing its existing Saas offering, the Security Culture Toolkit. This new range consists of CLTRe Control, …

Fix for actively exploited Flash Player 0day is out, patch ASAP!
Adobe has issued a patch for the Plash Player zero-day vulnerability (CVE-2016-4171) that is actively exploited by the ScarCruft APT group. The bug, discovered by Anton Ivanov …

How attackers can hijack your Facebook account
Positive Technologies researchers have demonstrated that knowing a user’s phone number and how to exploit a vulnerability in the SS7 network is enough to hijack that …

Microsoft creates Checked C extension to prevent common coding errors
Fixing vulnerabilities in completed software and systems is all good and well, but with Checked C, an extension for the C programming language, Microsoft researchers want to …

Cisco’s small business Wi-Fi routers open to attack, no patch available
Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …