Windows flaw allows access to data after accounts are revoked
A disabled account in Windows’ network does not take effect immediately, according to Aorato. In fact, due to design considerations disabled accounts – and the …
Embedding positive security behaviors is essential
Organizations have spent millions over recent decades on information security awareness activities. The rationale behind this approach was to take their biggest asset – …
Cybergangs accelerating velocity of targeted brand development
Cybercrime gangs are accelerating their substitution of targeted brands at an alarming new pace, according to a new APWG report. Of the 681 targets that were phished in 2H …
Tips for utilities to comply with new cybersecurity standards
When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …
John McAfee releases secure messaging app
John McAfee (and, alternatively, his name) has long been a fixture in the security market. And, finally, after a considerable hiatus and crazy happenings, the man is back with …
Global cost of data breach goes up by 15 percent
The average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million, say the results of Ponemon Institute’s ninth annual Cost of …
EFF invites users to test online tracking blocker
The Electronic Frontier Foundation is on a mission: give users a tool that will help them disallow/block trackers contained within the Web pages they visit. They have been …
Android “Police Locker” ransomware set to attack
Android users might soon become victims of “Police Locker” ransomware, if they haven’t already, warns the researcher behind the Malware don’t need …
Mobile phone security transformed with 4 new encryption apps
Following the high profile breaches of mobile phone security that have hit the headlines in recent years, a British company has launched a new range of mobile phone apps that …
Researchers share details about recent IE 0-day exploit and its delivery
Given that Microsoft has closed the Internet Explorer 0-day vulnerability that was exploited to compromise US-based defense and financial firms, the Sourcefire vulnerability …
Researchers debunk severity of OAuth “Covert Redirect” bug
Late last week, a Ph.D. student at the Nanyang Technological University in Singapore made the information security world pause for a moment by claiming that he had found a …
NIST updates Transport Layer Security (TLS) guidelines
The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC