Are IT pros overconfident in their ability to deflect attacks?
IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with …
Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware
Here’s an overview of some of last week’s most interesting news, reviews and articles:First Java zero-day in two years exploited by Pawn Storm hackersThe flaw was …
Google Safe Browsing to start blocking sites with ads leading to unwanted software
Ad networks that don’t vet carefully what ads they serve will be the next “victims” of Google’s Safe Browsing service.Since August 2014, Google has …
School monitoring software’s hard-coded encryption key exposed
Impero Software is the creator and seller of “Impero Education Pro”, a piece of software that’s used in many UK schools to monitor school computers for …
Nearly all websites have serious security vulnerabilities
A new Acunetix report on 5,500 companies comprising 15,000 website and network scans, performed on over 1.9 million files, finds nearly half of the web applications scanned …
Hacking Team used fake app hosted on Google Play to install its spyware on Android devices
“The massive Hacking Team data leak includes the source code of a fake Android news app and instructions on how to use it, Trend Micro researchers have found. The app, …
Is this the death knell for the RC4 encryption algorithm?
It has been known for quite some time that the RC4 cryptographic cypher – used in popular Internet protocols such as TLS and HTTPS – is vulnerable to attack, but …
Why enterprise security priorities don’t address the most serious threats
In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence …
Global action takes down Darkode cybercriminal forum
This week, law enforcement and judicial authorities worldwide have taken down the most prolific English-speaking cybercriminal forum to date: Darkode.In an international …
SanDisk unveils new wireless flash drive
SanDisk unveiled a new wireless mobile flash drive, the SanDisk Connect Wireless Stick, which enables sharing, transferring and accessing data between mobile devices and …
Researchers prove HTML5 can be used to hide malware
“A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute …
New GamaPoS malware targets US companies
“After dedicating their efforts to swelling the number of computers roped into their malicious net, the masters of the Andromeda botnet are putting it to use by …
Featured news
Resources
Don't miss
- Why app modernization can leave you less secure
- How AI agents reshape industrial automation and risk management
- How well do you know your remote IT worker?
- LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks
- NIST proposes new metric to gauge exploited vulnerabilities