Last Updated on 20 Nov. 2015, Total: 97 Blog Posts

  1. The Web’s Shadiest Neighbourhoods

    Blue Coat Reveals the Web's Shadiest Neighborhoods... Read More

  2. Office malware creation kit revealed

    It seems that some cyber gangs are learning that less really can be more... Read More

  3. Freeware automation tool leveraged by targeted attacks

    Phishing attacks are a serious threat that users and organizations face every day... Read More

  4. Leveraging Microsoft SMB protocol to create a new attack vector

    Security researches at the Black Hat USA 2015 conference in Las Vegas, explain how an extension of Microsoft Server Message Block (SMB) attacks allows credentials theft and user impersonation from the internet... Read More

  5. File synchronization services can be easily turned into an infrastructure for endpoint compromise

    Security researchers from the Imperva Hacker Intelligence Initiative demonstrate a new type of attack referred to as “Man in the Cloud” (MITC)... Read More

  6. Phishing Mitigation and Response Recommendations

    The United States Computer emergency readiness team (US-CERT) is aware of three phishing campaigns targeting U.S. Government agencies and private organizations across multiple sectors... Read More

  7. The deployment of IoT devices is ahead of the technology necessary to protect them

    These devices are expected to bring a range of new security and risk challenges to the enterprise... Read More

  8. Microsoft releases a critical security fix

    The out-of-band security update addresses the vulnerability by correcting how the Windows Adobe Type Manager Library handles OpenType fonts... Read More

  9. Consumers Lose Faith in Passwords

    TeleSign consumer account security report is an international study of digital security concerns and practices... Read More

  10. Firefox browsers block vulnerable Flash Player Plugin

    Flash Player Plugin (click-to-play) has been blocked for your protection... Read More

Featured Links