The shift to secure apps in the enterprise
As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …
Mobile security market to reach $34.8 billion by 2020
BYOD is adopted by most SMBs and large organizations, a major reason for the adoption of mobile security software. Smartphones are majorly adopted in Asia Pacific region and …
Week in review: Komodia SSL-busting code found in other software, critical Samba flaw, and black hole routing
Here’s an overview of some of last week’s most interesting news and articles: Is the Internet hiding a crime wave? The U.S. crime rate continues to fall, according …
Compromised cPanel “Account Suspended” pages redirect to exploit kit
All Internet users have, at least once in their lives, seen the following “Account Suspended” page: That’s because it’s part and parcel of cPanel, one …
Medical identity theft affected two million victims in 2014
The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013. In the five …
Critical vulnerabilities affecting SAP business critical apps
Onapsis released five security advisories detailing vulnerabilities in SAP BusinessObjects and SAP HANA enterprise software. Included in the security advisories are three high …
Cyber attackers like to impersonate IT workers
Mandiant, the (apparent) go-to firm for the forensic investigation of high-profile breaches, has released its annual M-Trends report (registration required), which shows that …
Aggressive adware in Google Play apps
Bitdefender has discovered 10 Google Play apps that have been packed full of aggressive adware. These either subscribe users to premium-rate numbers using scareware messages …
Security framework for governments deploying the cloud
ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …
Freeware tool helps monitor privileged accounts
Netwrix Effective Permissions Reporting Tool is a freeware solution designed to monitor privileged accounts by reporting on effective permissions in Active Directory and file …
Real MITM attacks enabled by Komodia’s software might have already happened
When the issue of Lenovo’s pre-installed SSL-breaking Superfish adware first gained widespread media recognition, the company’s CTO Peter Hortensius tried to do …
Cisco, Apple, Citrix products no longer welcome on Chinese government systems
A slew of US tech companies have been dropped from China’s Ministry of Finance’s approved government procurement list, including Apple, McAfee, Citrix Systems and …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC