30+ bugs found in Google App Engine
Adam Gowdiak, CEO of Polish firm Security Explorations, has announced that his team of researchers have discovered over 30 serious security issues in the Java security sandbox …
Internet freedom around the world is in decline
US-based NGO Freedom House has published its fifth annual Freedom of the Net study and the results are upsetting: internet users in nearly half of the 65 countries assessed in …
(IN)SECURE Magazine issue 44 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 44 has been released today. Table of contents: The …
Sony hack: Employees get threatening emails
Employees of Sony Pictures Entertainment have received a bizarre email purportedly sent by the hackers who took down the company’s network and systems. In broken …
The rise of IoT 2.0 and the battle for the connected home
Sansa Security revealed the company’s Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year. 1. The rise of IoT …
What will create cybersecurity challenges in 2015?
Security experts at Unisys predicted even greater cybersecurity challenges in the year ahead as continued growth in the use of mobile devices and applications in the …
Whitepaper: 10 Things Your Next Firewall Must Do
NOTE: This whitepaper is no longer available, thanks for your interest. Over time, the fundamental functions your firewall executed have been nullified by the very traffic …
Free webinar: What’s new in ISO 27001 2013 revision
Register for this webinar to learn: Main changes in ISO 27001 2013 revision Required documents for the new ISO 27001 How the transition works with certification bodies 12 …
Week in review: Sony hack, turning kids into infosec heroes, and cybersecurity in 2015
Here’s an overview of some of last week’s most interesting news and articles: Protecting your child’s digital identity Kids’ identities are stolen over …
Sony hack: Lousy security, customized malware linked to previous attacks
The security picture painted by the stolen and leaked documents from Sony Pictures Entertainment becomes uglier by the day, as several companies and news outlets continue to …
Bebe Stores latest victim of a payment card breach
Another big US-based has suffered a card data breach. According to information initially gathered by Brian Krebs and several banks, Bebe Stores – a women’s retail …
RFID forensic evidence management
Radio frequency identification (RFID) tags—devices that can transmit data over short distances to identify objects, animals or people—have become increasingly popular for …