
Cisco kills hardcoded password bug in Wi-Fi access points
Along with fixes for a number of older vulnerabilities in Cisco IOS and IOS XE software, the Cisco IOS Software Common Industrial Protocol, and the OpenSSL package …

CWA hackers breached US DNI Clapper’s email, broadband account
Crackas With Attitude (CWA), a group of hackers with a pro-Palestinian agenda, have hit another high-rank US intelligence chief. The first time around, in October 2015, it was …

800 risk experts from 40 countries identify the top global business risks
The risk landscape for businesses is substantially changing in 2016. While businesses are less concerned about the impact of traditional industrial risks such as natural …

Shift in strategy around cloud adoption and security
Cloud adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place, according to a new CSA survey. …

Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …

Cloud Identity and Access Management market to reach $2.8 billion by 2020
A new report by Allied Market Research projects that the global cloud IAM market would garner revenue of $2.8 billion by 2020, registering a CAGR of 26.2% during the forecast …

Your smartwatch can give away your payment card’s PIN code
Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an …

Android banking Trojan defeats voice call-based 2FA
Bankosy is a banking Trojan that has been targeting Android users for a while now, but has only recently been updated with a new capability of note: the ability to deceive …

Fortinet says backdoor found in FortiOS is “a management authentication issue”
Fortinet, the company whose enterprise network security offerings include the popular FortiGate firewall platform, has issued a statement regarding a security issue that has …

Microsoft ends support for Windows 8, IE8 through 10: What does this mean for you?
Slowly but surely, Microsoft is pushing users towards Windows 10 and its new browser, Microsoft Edge. The way through this is by stop providing technical support and security …

Attackers use SQL injection to manipulate search engine rankings
Akamai has identified a sophisticated SEO campaign that uses SQL injection to attack targeted websites. Affected websites will distribute hidden HTML links that confuse search …

Most companies do nothing to protect their mobile apps
There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?