Please turn on your JavaScript for this page to function normally.
Compromising Macs with simple Gatekeeper bypass

Patrick Wardle, director of research at security firm Synack, has discovered a worryingly simple way to bypass OS X’s Gatekeeper defense mechanism: just bundle up a …

The value of threat intelligence

When it comes to understanding how a hacker penetrated the corporate network, nearly a quarter (23 percent) had no insight on which channel a breach occurred, according to …

The barriers to cybersecurity research, and how to remove them

Earlier this year, a considerable number of computer scientists and lawyers, from academia, civil society, and industry, congregated at UC Berkeley School of Law to take part …

CISOs are looking for more integration and automation

Enterprise CISOs are looking for more integration and automation among their existing IT security tools, and that most are only periodically monitoring and mitigating events …

Fragmented approaches to PKI don’t always follow best practices

Independent research by the Ponemon Institute reveales increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, supporting a growing …

500 million users at risk of compromise via unpatched WinRAR bug

A critical vulnerability has been found in the latest version of WinRAR, the popular file archiver and compressor utility for Windows, and can be exploited by remote attackers …

Scammers use Google AdWords, fake Windows BSOD to steal money from users

Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number …

Attackers posing as legitimate insiders still an enormous security risk

Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …

Companies leave vulnerabilities unpatched for up to 120 days

Kenna studied the proliferation of non-targeted attacks and companies’ ability to mitigate these threats through the timely remediation of security vulnerabilities in their …

Women represent only 10% of the infosec workforce

Surveying nearly 14,000 global professionals, a new (ISC)2 report focuses on the lack of gender diversity in the information security workforce despite a cyber landscape that …

File insecurity: the final data leakage frontier

The growth of cloud and mobile computing, the ease at which files can be shared and the diversity of collaboration methods, applications and devices have all contributed to …

VBA malware is back!

“VBA malware is far from dead. In fact, as Sophos researchers recently noted, approximately 50 to 100 new VBA malware samples are spotted each day. For those who …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools