Surviving in the IoT world: Risks of smart home devices
Investigating some of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious threats to the connected home. These include a …
It’s official! People want a more trustworthy Internet
As part of a major research effort, the National Cable & Telecommunications Association (NCTA) unveiled cumulative data from their online survey of more than 100,000 …
IT priorities are changing: Cloud-first strategy to rise
Bitglass conducted an survey of nearly 100 IT leaders attending the Gartner Symposium IT Expo in Orlando, Fla. to better understand their top challenges for 2016 and how they …
Sale of legitimate code-signing certs booms on darknet markets
In the underground cybercrime economy, many players have specialized in one or two skills and services. It should come as no surprise, then, that some have become experts at …
Trojanized versions of 20,000 popular apps found secretly rooting Android devices
Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …
90% of directors believe regulators should hold firms liable for hacks
A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …
Crypto-ransomware encrypts files “offline”
Ransomware comes in various forms, and not all ransomware encrypts files – some just block computers until the ransom is paid. When the file encryption feature is …
Firefox 42 is out, with many privacy and security improvements
Mozilla has released Firefox 42, and with it, a new feature that should increase user privacy online.It’s called Tracking Protection and it’s incorporated into the …
Business leaders increasingly drive cloud migration
Vanson Bourne polled 500 UK IT and business decision-makers who have either been through or are currently planning a cloud migration project. They found that the decision to …
10% of enterprises have at least one compromised device
As the future of work evolves toward mobility, so will the future of data breaches and cybercrime. Recent attacks targeted mobile apps and operating systems to exfiltrate …
Raw threat data is not effective, it’s time for threat intelligence
A new Ponemon Institute survey includes insight from 692 IT and IT security professionals from both global businesses and government agencies, who answered more than …
11 zero-days uncovered in Samsung Galaxy S6 Edge
An internal contest between the North American and European members of Google’s Project Zero has resulted in the discovery of eleven high-impact zero-day flaws affecting …
Featured news
Resources
Don't miss
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)