- Free New Scanner Aims to Protect Home Networks
Free software pinpoints vulnerabilities and offers suggestions for remediation.
- The Fundamental Flaw in Security Awareness Programs
It's a ridiculous business decision to rely on the discretion of a minimally trained user to thwart a highly skilled sociopath, financially motivated criminal, or nation-state.
- 6 Ways to Tell an Insider Has Gone Rogue
Malicious activity by trusted users can be very hard to catch, so look for these red flags.
- Beyond Passwords: Why Your Company Should Rethink Authentication
Scaling security infrastructure requires scaling trust of users, devices, and methods of authentication. Here's how to get started.
- Number of Retailers Impacted by Breaches Doubles
The retail race for digital transformation is being run without the safety of security measures.
- Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
- Messenger Apps Top Risk Hit Parade
Whether running on iOS or Android, Facebook's and WhatsApp's messenger apps present a 'winning' combination.
- Robotic Vacuums May Hoover Your Data
Researchers have discovered a pair of vulnerabilities that allow unauthorized code execution in a robotic vacuum.
- Make Security Boring Again
In the public sector and feeling overwhelmed? Focus on the basics, as mind numbing as that may sound.
- New Subscription Service Takes on Ransomware Protection
Training and response is the basis of a new offering that addresses ransomware and extortion attacks.
- Microsoft Moves Up As Phishers' Favorite Target for Brand Spoofing
Researchers compiled a list of the most common brands to impersonate by detecting and analyzing new phishing URLs.
- From Bullets to Clicks: The Evolution of the Cyber Arms Race
Cyber strategies have become as important as physical weapons in the battle for political advantage. Here's a quick look at four broad categories.
- White House Cybersecurity Strategy at a Crossroads
Trump administration's initial lack of a unified front in the wake of Russian election-hacking indictments worries cybersecurity experts.
- One-Third of Businesses Lack a Cybersecurity Expert
Alarming, yes, but it's actually an improvement over past years, a new Gartner survey of more than 3,000 CIOs reveals.
- Cloud Security: Lessons Learned from Intrusion Prevention Systems
The advancement of AI-driven public cloud technology is changing the game of "protection by default" in the enterprise.
- Nearly Half of Security Pros Reuse Passwords
Survey exposes poor security practices by the people who should know better.
- SCADA/ICS Dangers & Cybersecurity Strategies
Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer.
- 7 Nigerians Indicted for Fraud Operation on Dating Sites
Con artists have been charged with operating a scheme that cost users of American dating websites more than $1.5 million.
- Russian National Vulnerability Database Operation Raises Suspicions
Recorded Future says Russia's Federal Service for Technical and Export Control has ability to find, weaponize vulnerabilities under cover of doing technology inspections.
- Less Than Half of Cyberattacks Detected via Antivirus: SANS
Companies are buying next-gen antivirus and fileless attack detection tools but few have the resources to use them, researchers report.