
Private browsing is not that private, but it can be
Private, “Incognito mode” browsing sessions are not as foolproof as most users believe them to be. “After a private session terminates, the browser is …

A view of the global threat landscape: Cybercrime and intrusion trends
Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, …

Global megatrends that are problematic for the state of cybersecurity
The majority of senior-level IT professionals fully expect their organization will experience a catastrophic data breach that could greatly impact shareholder value, according …

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity
Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have …

ISO 27001 & cybersecurity training and qualifications: Now in New York
Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and live and online …

Which phishing messages have a near 100% click rate?
Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rates decrease. For …

The economic impact of cybercrime? Almost $600 billion
Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, according to a …

Counterfeit digital certificates for sale on underground forums
Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and …

New infosec products of the week: February 23, 2018
Cisco offers cloud-based endpoint security solutions for MSSPs Cisco is offering MSSPs security, visibility, and control of customer endpoints. Their endpoint security …

Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most …

Trend Micro fixes serious vulnerabilities in Email Encryption Gateway
Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a …

Intel releases Spectre 2 microcode updates for Kaby Lake, Coffee Lake, Skylake
Intel has released to OEMs a new set of Spectre firmware updates. They include microcode for Kaby Lake, Coffee Lake, and Skylake processors. “This represents our 6th, …