SecureAuth and Core Security have announced plans to merge, combining security operations and identity and access management
Kali Linux 2017.2 Release
We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. In tangible terms, if you were to install Kali from your 2017….
The Encryption That Businesses Need, But CISOs Forget About
By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg
Many businesspeople put their firms’ data at risk because they fail to understand several important concepts about encryption. Simply understanding that data…
IBM: Crypto-Mining Attacks Increased Six-Fold in 2017
Vulnerable enterprise servers increasingly targeted
IBM: Crypto-Mining Attacks Increased Six-Fold in 2017
Vulnerable enterprise servers increasingly targeted
Uninspiring Lessons Threaten to Worsen Cyber-Skills Crisis
McAfee report finds few school leavers with positive memories of IT teaching
Why Your Data Security Strategy Should Include Data Masking
Data Masking/Tokenization/Anonymization replaces sensitive information with fictitious data while retaining the original data format. The data masking process lets you continue to work with your data as if it were not encrypted. Databa…
Web Cam Child Exploitation Gang Gets 171 Years in Jail
Final four were sentenced on Friday
Fitbit Vulnerabilities Expose Wearer Data
Flaws allowed access to personal information.
Most Wanted Malware: Banking Trojans Come to the Fore Again
Banking trojans were extensively used by cyber-criminals during August, with three variants appearing in Check Point’s latest Global Threat Impact Index.