Please turn on your JavaScript for this page to function normally.
Lovense
Teledildonics maker Lovense fixes bug to delete recordings of user sessions from phones

Late last week, a Reddit user took to the popular discussion site to reveal that the app that is used to control remote control sex toys made by Lovense “seems to be …

GDPR CCTV
Is your CCTV system GDPR compliant?

Organisations are putting themselves at risk of breaching the GDPR because they’re failing to realise that the new regulation covers their CCTV systems and the visual data …

euro
EMEA IT spending to exceed $1 trillion in 2018

IT spending in EMEA is projected to total $1 trillion in 2018, an increase of 4.9 percent from estimated spending of $974 billion in 2017, according to the latest forecast by …

hands
Week in review: Top GDPR compliance risks, DDE attack mitigations, Node.js security

Here’s an overview of some of last week’s most interesting news and articles: Infosec expert viewpoint: Vulnerability patching Vulnerability patching is one of the …

CIA
Vault 8: WikiLeaks starts releasing source code of alleged CIA cyber weapons

WikiLeaks is starting a new series of leaks, dubbed Vault 8, containing source code and materials allegedly stolen from the CIA. The Vault 8 leaks will ostensibly cover …

PTP-RAT
Data exfiltration tool PTP-RAT encodes data in pixel colour values

How to exfiltrate data from a machine that doesn’t have file transfer capabilities or whose Remote Desktop Protocol (RDP) connection has been locked down, making it …

Phishing is a greater threat to users than keyloggers and third-party breaches

When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …

vault
New infosec products of the week​: November 10, 2017

Login to Office 365 with your face Nexus Group is the first authentication app supplier to show off logging in with iPhone X Face ID to digital resources on a computer. The …

mobile code
Eavesdropper vulnerability exposes sensitive corporate communications data

Appthority published research on its discovery of the Eavesdropper vulnerability, caused by developers carelessly hard coding their credentials in mobile applications that use …

Node.js Foundation
Node.js security: Are developers confident in the quality of their code?

A NodeSource and Sqreen joint developer survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in …

hot
Digital business is turning CIOs into leaders

For 82 percent of EMEA CIOs digital business has led to a greater capacity for change and a more open mindset in their IT organization, according to Gartner‘s annual …

stop
Microsoft offers mitigation advice for DDE attacks scenarios

Microsoft has published a security advisorty containing DDE attack mitigation instructions for both users and admins. What’s a DDE attack? For a while now, attackers …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools