Industry Insight News, Articles and Updates

MedSec goes its own way with medical device flaw

MedSec goes its own way with medical device flaw

By

Eschewing the bug bounty route, a cybersecurity firm which detected a flaw in a medical device from St. Jude Medical, partnered with an investment firm to capitalize on its knowledge and short sell stock in the device manufacturer.

United Airlines' attempt at 2FA divides customers

United Airlines' attempt at 2FA divides customers

By

Customers and researchers alike are chastising United Airlines' attempt at using two-factor authentication to secure its MileagePlus account holders.

Ransomware: The evolution of cybercrime, a roundtable

Ransomware: The evolution of cybercrime, a roundtable

By

The threat from ransomware continues to grow and the situation will only get darker before mitigation efforts prove reliable and the miscreants move on to another attack vector, according to a panel of cybersecurity experts gathered in Manhattan on Wednesday for the Dell Data Security Ransomware Roundtable.

Dridex on the loose again, this time in Switzerland

Dridex on the loose again, this time in Switzerland

By

The meteoric rise of Locky ransomware has not completely supplanted the distribution of the notorious Dridex malware.

Threat to SMBs from ransomware on the rise, report

Threat to SMBs from ransomware on the rise, report

By

Ransomware is not going away, according to a new study from Arctic Wolf Networks.

Cisco shedding 7% of its workforce

Cisco shedding 7% of its workforce

By

The world's biggest networking equipment company, Cisco Systems, will layoff about 5.5K employees.

Women receive significantly less compensation than men in IT sector, Census Bureau

Women receive significantly less compensation than men in IT sector, Census Bureau

By

Women continue to receive significantly less compensation than men in the IT security sector, according to a new report from the U.S. Census Bureau.

Chrome and Firefox address bar vulnerabilities allow spoofed URLs

Chrome and Firefox address bar vulnerabilities allow spoofed URLs

By

A Pakistani security researcher discovered a vulnerability affecting Chrome and Firefox browsers configuration of URLs in address bars.

Half of enterprises ill-prepared for inside attack, study

Half of enterprises ill-prepared for inside attack, study

By

Nearly half of enterprises queried for a Mimecast survey were found to be ill-equipped to deal with threats from insiders.

PilotFish source codes selling on dark web, report

PilotFish source codes selling on dark web, report

By

In what is being flagged as a threat to the health care sector, the source code of all of PilotFish Technology's software has been posted to the dark web.

New Zeus Sphinx banking trojan hitting Brazil

New Zeus Sphinx banking trojan hitting Brazil

By

Capitalizing on Olympics activity, a new version of Zeus Sphinx has been targeting banks in Brazil and Colombia.

Facebook hit with hoax scams purporting terror incidents and celebrity deaths

Facebook hit with hoax scams purporting terror incidents and celebrity deaths

By

Facebook users are being lured into giving up their credentials in response to alarming messages about terror incidents and celebrity deaths.

Chip drivers render 900M Android devices vulnerable to attack

Chip drivers render 900M Android devices vulnerable to attack

By

A set of vulnerabilities, dubbed "Quadrooter," affecting Qualcomm chipset software drivers used in Android devices, were detected by Check Point security researchers.

Nigeria-based BEC scams pulling in millions, SecureWorks report

Nigeria-based BEC scams pulling in millions, SecureWorks report

By

A transfer of $400,000 was redirected to a group of Nigerian hackers.

Apple offers bug bounty program

Apple offers bug bounty program

By

Apple is offering up to $200,000 to researchers reporting critical security vulnerabilities in Apple software, including its underlying operating system.

Researchers discover Windows issue that allows UAC bypass

Researchers discover Windows issue that allows UAC bypass

By

Security researchers discovered a flaw that affects Windows 10's SilentCleanup process and allows attackers to bypass the User Account Control (UAC) security feature.

C&C using SSL to hide malware increased by 200 times - report

C&C using SSL to hide malware increased by 200 times - report

By

A research report discovered command and control servers (C&C) that use SSL to disguise malware increased by 200 times last year.

Russian web hub Deer.io offering stolen goods and exploit services, report

Russian web hub Deer.io offering stolen goods and exploit services, report

By

A robust underground marketplace for the sale of stolen products from compromised accounts as well as shady online services has been detected in Russia.

Feds would benefit from adoption of IoT, analysis finds

Feds would benefit from adoption of IoT, analysis finds

By

The federal government would greatly benefit from implementation of Internet of Things technology, but few agencies are taking advantage, says the Center for Data Innovation.

Farsight Security Services promotes Robert Batch to IT administrator

Farsight Security Services promotes Robert Batch to IT administrator

By

Farsight Security Services has promoted Robert Batch, a 12-year veteran employee, to IT administrator.

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

By

Rapid7 has appointed Marc Brown and Tom Schodorf to its Board of Directors.

IT jobs volume hits peak despite slow start in 2016

IT jobs volume hits peak despite slow start in 2016

Despite a slow start at the beginning of 2016, the IT jobs market in London experienced an upturn in the number of jobs with June being the highest month so far for job volume in 2016.

Twitter rolls out online application process for account verification

Twitter rolls out online application process for account verification

By

Twitter said Tuesday it had created an online application process so that Twitter accounts could receive verified status.

Researchers detect malware in TLS connections without decrypting traffic

Researchers detect malware in TLS connections without decrypting traffic

By

Researchers discovered a way to detect and block malware in Transport Layer Security (TLS) connections without decrypting the traffic.

President Trump 'would be a disaster for innovation,' say Silicon Valley leaders

President Trump 'would be a disaster for innovation,' say Silicon Valley leaders

By

Silicon Valley tech sector leaders released a statement expressing dismay at the possibility of Donald Trump becoming president.

Cybercrime now tops traditional crime in U.K.

Cybercrime now tops traditional crime in U.K.

By

A report from the U.K.'s National Crime Agency found that cybercrime has passed traditional crime in terms of impact.

Keydnap malware targeting Mac users, particularly security researchers

Keydnap malware targeting Mac users, particularly security researchers

By

A new malware strain, dubbed Keydnap, is targeting Mac users, perhaps, in particular, security researchers.

Clinton pledges tech evolution

Clinton pledges tech evolution

By

Democratic presidential hopeful Hillary Clinton called for administrative reform to help bring the U.S. copyright system into the digital age.

Recycled hard drives rich with residual data, study

Recycled hard drives rich with residual data, study

By

The amount of digital information stored on recycled devices is staggering, a new study found.

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

By

London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US