Top

LATEST PUBLICATIONS



Crooks use math symbols to evade anti-phishing solutions

October 13, 2021

Researchers from anti-phishing cybersecurity firm INKY have detailed a new technique to evade detection in phishing attacks, it leverages using mathematical symbols on impersonated company logos. The experts analyzed the case of a campaign targeting the customers of the telecommunication […]


TSA to issue cybersecurity requirements for US rail, aviation sectors

October 7, 2021

After issuing cybersecurity requirements for pipeline companies via two directives earlier this year, the Transportation Safety Administration (TSA) will now also issue cybersecurity requirements for rail systems and airport operators. The two pipeline directives followed a high-profile ransomware attack on […]


Apple Pay Visa feature could be hacked to drain your wallet

September 30, 2021

Cybersecurity researchers have demonstrated what they claim to be security issues in Visa and Apple payment mechanisms to make fraudulent contactless mobile payments. The researchers from University of Birmingham and University of Surrey used a locked iPhone to make a […]


Cyber warfare, Cyber-crime, Malware

Nations Reveal Ransomware Pain at US-Led Summit

October 14, 2021

Via: Security Week

The United States has convened some 30 countries — with the notable exception of Russia — to boost cooperation in fighting the costly and disruptive attacks that have boomed around the world. As if on cue, Yigal Unna, director of […]


Network security, Security

Biden Administration Signs K-12 Cybersecurity Act: Will it Make a Difference?

October 14, 2021

Via: SecureWorld

Schools have taken a big hit due to cyberattacks. In some cases, incidents involving educational institutions have resulted in truly terrible consequences. Just a few of the recent examples are data breaches where a child’s data was used to apply […]


Threats & Malware, Vulnerabilities

Storage systems vulnerabilities: Act now to avoid disasters

October 14, 2021

Via: Help Net Security

Continuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage systems have a significantly weaker security posture than the other two layers of IT infrastructure: compute or […]


Mobile, Mobile security

Apple Points to Android Malware Infections in Argument Against Sideloading on iOS

October 13, 2021

Via: Security Week

Sideloading is the process of downloading and installing mobile apps on Apple devices from sources other than the official App Store, such as through direct downloads or third-party app stores. There has been pressure on Apple to support sideloading, but […]