October 6, 2017 HTTPS in the TLD? Google’s HSTS Goes Live 2 min read - With the introduction of Google's HTTPS Strict Transport Security (HSTS) preload program, TLDs owned by the search giant will now enforce HTTPS by default.
October 5, 2017 IoT Security Has a Growing Effect on Public Key Infrastructure, Survey Says 2 min read - According to a recent survey by the Ponemon Institute, IoT security needs will drive increased use of public key infrastructure over the next two years.
October 3, 2017 Cybercriminals Use Legitimate VMware Binary to Create New Malware Threat 2 min read - Cisco Talos discovered a new banking Trojan that exploits an authentic VMware binary to hide its malicious activities from security researchers.
October 3, 2017 Piecemeal Protection? Automatic Apple Firmware Updates Incomplete 2 min read - Incomplete updates to Apple firmware are putting users at risk of total device compromise, according to new security data.
October 2, 2017 As Cybersecurity Awareness Increases, Information Sharing Lags, Survey Shows 2 min read - Although more than three-quarters of company directors reported a rise in cybersecurity awareness, only one-quarter actively share threat information.
October 2, 2017 Malware Mines Monero on Vulnerable Servers 2 min read - Security researchers reported that threat actors have been targeting vulnerable servers to mine for cryptocurrency since about May 2017.
October 1, 2017 IBM Helps Keep the Doors Locked to Cybercrime During European Cyber Security Month 3 min read - During European Cyber Security Month (ECSM), IBM is driving initiatives to help raise cybersecurity awareness and close the IT skills shortage.
September 28, 2017 Mobile Stock Trading Apps Vulnerable to Attack 2 min read - Over 20 mobile apps commonly used for stock trading are not very secure, according to recent security research.
September 28, 2017 Thermal Security Camera Flaws Could Let Cybercriminals Launch Remote Attacks 2 min read - Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
September 26, 2017 Ransomware Threat Means IT Managers Cannot Afford to Get Locky 2 min read - Locky ransomware is a rising threat again as millions of spam emails have been sent out in a new series of attacks.