Top

Tag: Tech


Cloud security

Misconfigured Google Groups Expose Sensitive Data

July 25, 2017

Via: Security Week

Researchers at cloud security firm RedLock believe hundreds of organizations may be exposing highly sensitive information by failing to properly configure Google Groups. Google Groups is a service that allows users to create and take part in online forums and […]


Email security

Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing

July 25, 2017

Via: Security Week

When I worked as a Principal Researcher at RSA Labs around year 2000, I was tasked to identify what might affect our revenue stream. “Anything,” I thought. Upon further reflection, I argued that criminals would start trying to steal passwords […]


Mobile security

Google Rolls-Out Play Protect Services for Android

July 25, 2017

Via: Security Week

After introducing the product at the Google I/O conference in May, Google has now made its Play Protect security services available to all Android users. Play Protect was designed to combine various Android security services, including Verify Apps and Bouncer, […]


Featured

Combatting the Growing Threat of Ransomware

April 13, 2017

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


Malware

43.7% of cloud-based malware delivers ransomware

September 9, 2016

Via: Help Net Security

According to a new Netskope report, 43.7% of malware found in enterprises cloud apps have delivered ransomware, and 55.9% of malware-infected files found in cloud apps are shared publicly. Enterprises, on average, have 977 cloud apps in use, up from […]


Vulnerabilities

Are all IoT vulnerabilities easily avoidable?

September 9, 2016

Via: Help Net Security

Every vulnerability or privacy issue reported for consumer connected home and wearable technology products since November 2015 could have been easily avoided, according to the Online Trust Alliance (OTA). “In this rush to bring connected devices to market, security and […]


Access control

Stealing login credentials from locked computers in 30 seconds or less

September 9, 2016

Via: Help Net Security

Security researcher Rob Fuller has demonstrated a simple way for stealing login credentials from locked computers running Windows and OS X. For the attack to work, you’ll need to have: Access to the targeted computer A portable, plug-in computer that […]


Vulnerabilities

Xen Project patches serious virtual machine escape flaws

September 9, 2016

Via: InfoWorld

The Xen Project has fixed four vulnerabilities in its widely used virtualization software, two of which could allow malicious virtual machine administrators to take over host servers. Flaws that break the isolation layer between virtual machines are the most serious […]


Cyber-crime, Phishing

New tech can help catch spearphishing attacks

September 7, 2016

Via: CIO

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment. Everything about the letter looked legit. “It has my display name, spelled correctly,” said Kevin O’Brien, co-founder and […]


Network security, Security

Healthcare Hacker Attacks: No End In Sight

August 8, 2016

Via: DataBreach Today

Once federal regulators confirm the details, the recent cyberattack on Banner Health Care, which may have compromised the data of as many as 3.7 million individuals, likely will be the largest healthcare data breach reported so far in 2016 – […]