The value in vulnerability management platforms
A study conducted by Forrester Consulting assessed IT decision makers’ satisfaction with their current vulnerability management platforms and the challenges companies …
The growth of mobile malware and online banking attacks
Kaspersky Lab explored the increase in mobile threats, malware attempts to steal from consumer online bank accounts and targeted cyberattacks in the evolving threat …
Researchers can identify people through walls by using wireless signals
Researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to “see” what a person is doing and …
Hacking Team pitches encryption-cracking tools to US law enforcement
Hacking Team, the Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies, is back in the saddle, …
Nearly 2,000 Vodafone UK customers’ accounts compromised, blocked
Customers of another UK telecom have had their information compromised by hackers, as Vodafone has explained that it was “subject to an attempt to access some customers’ …
TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners
News about the TalkTalk breach and the investigation of it are coming fast and thick. After the arrests of two teens (one in Northern Ireland, the other from Feltham) believed …
Most consumers believe cloud-based apps can be hacked
Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays
Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …
US DOJ admits that Stingrays can be used to intercept call and SMS content
After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …
10 tips to avoid viruses on Halloween
As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …
Second teenager arrested in connection with TalkTalk hack
Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace