Cloud-based security solution minimises an organisation’s attack surface by governing and securing federated access by outsourced IT, vendors and other…
Browsing: Malware and Vulnerabilities
Although 46 Percent of Global Organizations Received Customer Requests to Remove Data in Last 12 Months, 41 Percent Lack Defined…
You’ve heard about penetration testing, but you’re not sure what to ask or where to start. Here are some of…
Security experts offer cyber security advice for Internet Explorer 8, 9 and 10 users Beginning on Tuesday, January 12, 2016,…
The attack permits the malware to jump onto computers in a unique manner, using the ‘Range’ HTTPS header. The Ursnif malware…
Not sure if you’ve seen, but cloud software company Citrix has been hacked by an organisation called w0rm which exposed…
Researchers have discovered a new data stealing Trojan called Spyumel thatemploys real certificates to evade security tools. Hackers using Spymel…
The Star Wars BB-8 toy can be hacked via a firmware update hijack. Security researchers claim that the firmware update…
In the Rapid7 survey of 250+ global security pros, a majority of respondents report increased spending and focus on incident…
Graham Cluley is reporting that researchers have uncovered two critical vulnerabilities in the TV-streaming EZCast device that can lead to…