Cloud News, Articles and Updates

40 apps containing DressCode malware family found on Google Play

40 apps containing DressCode malware family found on Google Play

By

Researchers discovered 40 applications in the Google Play store that contain a new family of malware, dubbed DressCode.

OneLogin confirms bug which allows access to Secure Notes

OneLogin confirms bug which allows access to Secure Notes

OneLogin has confirmed that a bug has allowed a hacker to view some of its customers' encrypted Secure Notes.

Dropbox commended for its handling of massive data breach involving 68M users

Dropbox commended for its handling of massive data breach involving 68M users

By

Dropbox is being commended by security pros for its handling of a massive data breach that has exposed the login credentials of 68 million users.

Kaspersky patches DoS and kernel flaws affecting drivers

Kaspersky patches DoS and kernel flaws affecting drivers

By

A series of flaws affecting the consumer security suite Kaspersky Internet Security was patched by Kaspersky Lab.

Two-thirds of IT security pros surveyed expect a breach to hit their company, report

Two-thirds of IT security pros surveyed expect a breach to hit their company, report

By

While most organizations believe providing workers with the best technology is imperative to business productivity, many struggle to optimize agility owing to traditional security mindsets, according to a new study by Okta.

Cisco shedding 7% of its workforce

Cisco shedding 7% of its workforce

By

The world's biggest networking equipment company, Cisco Systems, will layoff about 5.5K employees.

Half of enterprises ill-prepared for inside attack, study

Half of enterprises ill-prepared for inside attack, study

By

Nearly half of enterprises queried for a Mimecast survey were found to be ill-equipped to deal with threats from insiders.

Researcher accidentally sent solar development device, says he can shut down electricity generation facilities

Researcher accidentally sent solar development device, says he can shut down electricity generation facilities

By

Security researcher Fred Bret-Mounet found vulnerabilities affecting the management unit on his home's solar array, a device that monitors solar panels over the internet.

O2 confirms USBs distributed in marketing campaign contain virus

O2 confirms USBs distributed in marketing campaign contain virus

By

USB pens distributed by the U.K.-based mobile network O2 as part of a promotional campaign for an eBook were discovered to contain a "Windows specific virus", according to a company statement.

U.K. testing social media logins for authentication

U.K. testing social media logins for authentication

By

To enhance the use of its web portal, gov.uk, the U.K. government is testing the use of its subscribers' social media logins as an authentication method.

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

By

A malicious spam email campaign discovered by FireEye, used Microsoft Word attachments containing macros that launched a command and control Cerber installers.

Cerber ransomware strain now targeting Office 365 users

Cerber ransomware strain now targeting Office 365 users

By

Researchers discover a new strain of the Cerber ransomware targeting Office 365 users. The variant is part of an emerging trend of ransomware that targets victims using cloud platforms.

Adwind RAT found in spam emails targeting Danish companies

Adwind RAT found in spam emails targeting Danish companies

By

Researchers discovered the Adwind RAT in spam emails containing the spyware as part of a campaign targeting companies in Denmark.

Cisco patches critical flaws affecting device software

Cisco patches critical flaws affecting device software

By

Cisco patched two critical vulnerabilities and a high severity flaw that allow attackers to bypass authentication.

Carbonite resets passwords after attackers target user accounts

Carbonite resets passwords after attackers target user accounts

By

Carbonite announced a forced password reset after the online backup provider discovered attackers attempting to access its user accounts.

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

By

At the Gartner Security & Risk Management Summit outside of Washington, D.C., this week, the firm revealed its top-10 list of information security technologies that are trending in 2016.

Air Force loses 12 years of fraud, abuse investigation records

Air Force loses 12 years of fraud, abuse investigation records

By

The U.S. Air Force lost 12 years of records containing fraud and abuse investigations from its inspector general and legislative liaison offices as a result of a database crash.

Morgan Stanley to pay $1M for failing to protect 730,000 customer accounts

Morgan Stanley to pay $1M for failing to protect 730,000 customer accounts

By

Morgan Stanley agreed to pay a $1 million fine to settle a proceeding launched by the Securities and Exchange Commission's that the financial services giant failed to set up adequate precautions of customer data.

HR vendor Empathia hit by potential breach

HR vendor Empathia hit by potential breach

By

Human resources vendor Empathia announced a potential data breach affecting its employee assistance program.

U.K. Parliament debates Snooper's Charter

U.K. Parliament debates Snooper's Charter

By

The legislation, also known as the Draft Data Communications Bill, would enlist U.K.-based companies to store a 12-month backlog of data about every individual.

Network security shifting toward machine learning, quantum computing, predicts expert

Network security shifting toward machine learning, quantum computing, predicts expert

By

At SC Congress Toronto, Evgeniy Kharam, director and network security solutions architect at Herjavec Group predicted that the future network security was in machine learning, quantum computing and the cloud.

"Children are dying" due to restrictions on data, warns cloud expert

"Children are dying" due to restrictions on data, warns cloud expert

By

Placing draconian restrictions on cloud-based data management as a measure of protection can have deleterious effects on society, warned Steven Woodward, director of the Cloud Security Alliance (CSA) Canada, at SC Congress Toronto 2016 today.

Workplace security awareness programs lacking in efficacy, says study

Workplace security awareness programs lacking in efficacy, says study

By

Just because a company offers a cybersecurity training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a report from Experian and Ponemon Institute.

Banks fail to innovate, blaming info security fears, report

Banks fail to innovate, blaming info security fears, report

By

Senior executives at retail banks are motivated to offer digital services, but are held back by cyber security concerns, according to a new study from Cisco.

Cisco patches Web Security Appliance flaws

Cisco patches Web Security Appliance flaws

By

Cisco patched vulnerabilities affecting the company's Web Security Appliance devices that affect how the web filtering devices process traffic.

FDA: Hackers want pharma data for competitive advantage

FDA: Hackers want pharma data for competitive advantage

By

FDA official provided detail about the agency's IT strategy that aims to strengthen protection of pharmaceutical companies' data submitted in regulatory filings during the approval process of new drugs.

Inside Dark Web: Security pros discuss threat protection and insiders

Inside Dark Web: Security pros discuss threat protection and insiders

By

Information security professionals discussed methods of protecting against threats from malicious actors and insiders at the Inside Dark Web conference in New York City on Thursday.

Advisory Committee expresses Quantum, legacy system concerns

Advisory Committee expresses Quantum, legacy system concerns

By

The National Security Telecommunications Advisory Committee (NSTAC) brought together Silicon Valley executives with federal officials at the advisory committee's annual meeting on Wednesday.

Google moves Blogger pages to HTTPS versions

Google moves Blogger pages to HTTPS versions

By

In a move to strengthen the security of its Blogger platform, Google launched HTTPS versions of all blogs hosted on the company's blogspot.com domain.

Microsoft expands bug bounty program to Nano Server

Microsoft expands bug bounty program to Nano Server

By

Microsoft continues to expand its bug bounty program, announcing it will pay up to $15,000 for vulnerabilities found in Nano Server.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US