
Most aerospace and defense companies to integrate blockchain by 2021
Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research …

Apple prohibits developers from using, selling users’ Contacts
According to new rules recently published by Apple, iOS app developers must refrain from creating a database of the information gleaned from users’ Contacts and to sell …

Researcher hacks smart fingerprint padlock in mere seconds
The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a …

Don’t start the blockchain revolution without making security a top priority
McAfee released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies, and asserts the necessity of making cybersecurity a top …

Europe and Russia home to half of credential theft victims worldwide
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

DNS amplification attacks double in Q1 2018
DNS amplification types of DDoS attacks doubled in the first quarter of 2018 over last quarter, and spiked nearly 700 percent year-over-year, according to Nexusguard. …

IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …

Compliance worries prevent greater cloud use
New research released by WinMagic shows that 87% of ITDMs limit their use of the cloud because of the complexity of managing regulatory compliance. A quarter said, it meant as …

Dixons Carphone breach: Personal and payment card info compromised
Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …

Overview: Microsoft June 2018 Patch Tuesday
It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …

Google removes inline installation option for Chrome extensions
Google is shutting down an often used vector for delivering malicious Chrome extensions to users by removing the inline installation option. What will happen? The announcement …

Zero Trust Security: Never trust, always verify
Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised