Cybersecurity researchers from Trend Micro are warning users of a malicious Chrome extension which is spreading through Facebook Messenger and targeting users of cryptocurrency trading platforms to st
Blog
-
New Rowhammer Attack Can be Used to Hack Android Devices Remotely Researchers have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones.Vulnerable smartphones can be targeted by tricking users into visiting a website hosting a m
4th May, 2018 -
New Phishing Attack Targets 550 Million Email Users Worldwide A new phishing campaign was discovered sending more than 550 million emails within the first quarter of 2018, according to data from Vade Secure. The threat was discovered in early January and has pri
30th April, 2018 -
Azure Container Instances Now Generally Available Microsoft announced the general availability of Azure Container Instances (ACI) – a serverless way to run both Linux and Windows containers. ACI offers an on-demand compute service delivering rapid de
30th April, 2018 -
Most Companies Not Ready for GDPR, Survey Reveals With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed describe themselves as ‘conf
30th April, 2018 -
Release of PoC Exploit for New Drupal Flaw Once Again Puts Sites Under Attack Only a few hours after the Drupal team releases latest updates to fix a new remote code execution flaw in its content management system software, hackers have already started exploiting the vulnerabil
27th April, 2018 -
AWS Joins the Blockchain Wagon, Targeting Healthcare and Finance Amazon Web Services (AWS) today joined its rivals in releasing a blockchain service, half a year after its CEO cited a lack of "practical use cases" for the technology.
27th April, 2018 -
Endpoint Security Solutions Failing to Stop Security Threats Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs. Read more to find out how to solve this is
27th April, 2018 -
-
Microsoft Launches Azure Sphere for Protection of IoT Devices The connected nature of IoT devices of course not only makes them more responsive, but also gives them access to sensitive data in our homes and workplaces, and they thereby become natural targets for
23rd April, 2018 -
Most Dangerous Cyberattack Techniques, and What’s Coming Next Experts from SANS presented the five most dangerous new cyber attack techniques in their annual RSA Conference 2018 keynote session in San Francisco, and shared their views on how they work, how they
23rd April, 2018 -
Traditional Firewalls Fall Short in Protecting Organizations, Survey Reveals The survey responses reveal several “dirty secrets” of how traditional firewalls aren’t living up to their old promises, and how they fail to deliver the kind of visibility or responsiveness that orga
20th April, 2018 -
Intel, Microsoft to Use GPU to Scan Memory for Malware Intel has announced some new initiatives that use features specific to the Intel hardware platform to boost security. Read more to learn how Intel plans to fight malware.
20th April, 2018