Please turn on your JavaScript for this page to function normally.
DDoS
Criminals leverage unsecured IoT devices, DDoS attacks surge

Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 – equivalent to 8 DDoS attack attempts every day – as hackers strive to take their …

kids smartwatch
German government bans children’s smartwatches, tells parents to destroy them

The Federal Network Agency (Bundesnetzagentur), Germany’s regulatory agency for public utility companies, has categorized children’s smartwatches as spying …

cloud
Sad state of enterprise cloud infrastructure governance

A new survey of more than 300 IT professionals, conducted by Propeller Insights in October 2017, revealed that the state of enterprise cloud infrastructure governance is …

risk
Week in review: Risk assessment, fileless attacks, and the most hackable holiday gifts

Here’s an overview of some of last week’s most interesting news and articles: Review: EU GDPR Documentation Toolkit The General Data Protection Regulation (GDPR) …

fingerprint
Poor security habits are the ideal recipe for a breach

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

Yoti
New infosec products of the week​: November 17, 2017

Yoti launches digital identity app The free app is available for Apple and Android phones and takes less than five minutes to set up. People take a selfie and scan a passport …

GDPR
A third of US businesses do not feel prepared for GDPR deadline

New research by Censuswide captures the preparedness levels of organizations in Europe and the United States for the May 2018 GDPR compliance deadline, as well as their …

Cisco
Critical flaw in Cisco collaboration products plugged

A critical vulnerability in a dozen Cisco collaboration products based on the Cisco Voice Operating System (VOS) could allow unauthenticated, remote attackers to gain access …

terminal
Half of organizations do not audit SSH entitlements

Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …

ImmuniWeb Discovery
High-Tech Bridge unveils free application discovery and inventory service

High-Tech Bridge announce the public launch of ImmuniWeb Discovery. The free service is a part of the ImmuniWeb Application Security Testing (AST) Platform. ImmuniWeb …

Quad9
Free security tool protects Internet users through DNS

IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) launched a free service designed to give consumers and businesses added privacy and security …

Google Play
Sneaky malware downloader found in apps on Google Play

Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools