Security

You’re patched, but are you insured? Check your cyber insurance policy

You may feel safe and secure if you’ve got your systems all patched. But do you know what your cyber…

3 weeks ago

What we can learn from the biggest 2018 data breaches

The biggest 2018 data breaches had one common thread — companies were clueless. Here’s what we can learn from their…

3 weeks ago

Sydney Airport to implement major security upgrades

Sydney Airport is taking its cybersecurity policies to the woodshed and improving as much as possible with a new round-the-clock…

3 weeks ago

Microsoft: No more updates for OS using SHA-1 encryption

SHA-1 encryption was determined to be ineffective 14 years ago. Microsoft is finally taking steps to eliminate it once and…

3 weeks ago

Trickbot malware updated to seek remote desktop credentials

The Trickbot banking Trojan is not a new malware, but a new recently discovered variant attacks remote application credentials.

3 weeks ago

Separ malware phishing campaign targets businesses

Separ malware is being utilized in a phishing campaign to target the credentials of businesses in a simple but incredibly…

4 weeks ago

Google introduces Adiantum encryption for Android devices

If AES encryption is not supported by your Android device, Google’s new Adiantum encryption may be your best bet to…

4 weeks ago

Broken hearts: OkCupid vulnerability exposes users credentials to hackers

Looking for a match on OkCupid? If you open certain links, you could find a nightmare scenario instead of your…

1 month ago

Pentesting primer: You’re getting ‘hacked,’ so read the fine print

Pentesting has become a popular approach for validating a company's security. This makes it even more important you read your…

1 month ago

Google says it’s bolstered its defenses against Play Store malicious apps

The Google Play Store has been in the news way too often in connection with malicious apps that end up…

1 month ago