2017 has been a busy year for cybersecurity. Between massive data breaches including Verizon, Equifax, Sonic, Uber, and the infamous…
Browsing: Malware and Vulnerabilities
This past October felt as if someone had called open season on IoT devices. One of the biggest headlines surrounded…
Orchestration and Automation In 2018, cybersecurity orchestration and automation will increase in both relevance and adoption. This will be driven…
Everything is connected, every surface area is primed for data-capturing IoT, and life is mostly conducted from our phones. Even…
According to recent news reports, a 19-year old vulnerability that enabled attackers to decrypt encrypted data and sign communications sites’ secret…
That time of year again, when people like me with a little space on the Internet try to predict what…
As a response to the story that One of Australia’s Richest Men Lost $1 Million in Email Scam, Steve Malone, Cyber…
It has been discovered by cyber security experts that hackers are using a new type of malware to target industrial…
Brian Krebs has issued his annual warning about gift card fraud – i.e. that fraudsters peel, snap & replace the number on the back…
The next 12 months will see major developments in the arms race between cyber attackers and security defenders as they…