Archive

Back to homepage
Hardware/Network

Companies leave vulnerabilities unpatched for up to 120 days

Kenna studied the proliferation of non-targeted attacks and companies’ ability to mitigate these threats through the timely remediation of security vulnerabilities in their software and network devices. Read the source

Software

Scammers use Google AdWords, fake Windows BSOD to steal money from users

Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number ostensibly manned by Microsoft

Software

500 million users at risk of compromise via unpatched WinRAR bug

A critical vulnerability has been found in the latest version of WinRAR, the popular file archiver and compressor utility for Windows, and can be exploited by remote attackers to compromise

Hardware/Network

Questions to ask when choosing a network security tool

In this article, expert Andrew Froehlich breaks down the top use cases for network security, and lays out the questions you should ask when choosing a network security tool. Justifying

Software

Why Securing Data Should Be Your No.1 Priority

The last couple of years saw many high-profile data breaches and hacks, which experts believe would amplify in the coming year. While projects such as #8216;Digital India#8217; will open windows

Industry Insights

The US Government’s $1B Contract To Fight Cybercrime

The U.S. Department of Homeland Security awarded intelligence, information and services business Raytheon one of the largest civilian cybersecurity orders in years, The Washington Post reported yesterday (Sept. 29). Raytheon

Vendor News

Juniper Networks Unveils Advanced Anti-Malware Cloud Service, Security Management And The Latest Firewalls To Protect …

Juniper Networks, the industry leader in network innovation, recently announced advanced anti-malware with zero-day threat protection from the cloud, redesigned security management and the latest firewalls for enterprise campus and

Identity Theft

Trump Hotels Confirms POS Malware Breach – DataBreachToday

The hotel chain bearing 2016 U.S. presidential candidate Donald Trump’s name has confirmed that its point-of-sale systems were infected by malware for more than a year. The confirmation comes about

Mobile

Researchers discover vulnerability in iOS app allowing malicious file attack

An arbitrary file upload vulnerability has been discovered in an iOS app that allows an attacker to deliver a malicious package during a file transfer operation. The app is Photos

Industry Insights

Attackers posing as legitimate insiders still an enormous security risk

Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest enterprise security risks. Sixty-one percent of