Charging Mobile Devices Could Put Data at Risk


Smartphones can be compromised when charged using a standard USB connection connected to a computer, Kaspersky Lab experts have discovered in a proof-of-concept experiment. The researchers are now evaluating what the impact of such an incident might be. Have you ever wondered how safe your smartphone and data are when you connect the device to […]

Another Wave of Malware Hits Europe, Mainly Downloading ‘Locky’ Ransomware, Ireland Affected


ESET finds Ireland among the top countries affected by new Danger.Script malware. ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries. The most notable detection ratios are seen in Luxembourg (67%), Czech Republic (60%), Austria (57%), Netherlands (54%) and the United Kingdom (51%), but Ireland follows closely with […]

Company Fires CEO After Falling Victim to $56-Million Online Scam

FACC, an Austrian-based manufacturer of airplane parts, has fired its CEO, Walter Stephan, after he fell victim to an email scam that defrauded the company of €52.8 million ($56.79 million). Ryan Kalember, senior vice president of cybersecurity strategy for Proofpoint commented below. Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint comments: Business email […]

High-Tech Bridge Uncovers Large Number of Fraudulent Cybersecurity Company Domains

Research into the proliferation of fraudulent domains affecting the cybersecurity industry by web security experts High-Tech Bridge has uncovered some startling results, with a string of household names being impersonated online. High-Tech Bridge researchers have analyzed domains of the leading cybersecurity companies from the NASDAQ’s NQCYBRindex, as well as few private but well-known cybersecurity companies, […]

Top 10 Tips for a Lean ISO 27001 Implementation

Are you contemplating ISO 27001 implementation but concerned about the time and management resources that will be needed? Many modern businesses operate in a lean and agile way and this is often seen as contradictory to the traditionally bureaucratic processes associated with ISO 27001. Some even believe it may restrict the way they run their […]