Most employees admit to ignoring security rules when they feel they have to: i.e., using personal devices to finish work at home.
Exaspy, a New Android Spyware, Targets Execs
Skycure found the commercial Android kit secretly recording meetings, taking screenshots and harvesting messaging info.
New Zealand Nurses Caught Out in Major Email Breach
Tens of thousands affected after staff member is phished
Yes, My Name is ||
Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name “Or”. I fact, my name has different meanings in different languages. In English the meaning of “Or” is funct…
#UNITEDsummit: Heisenberg Project Outlines Cloud Attack Realities
Honeypots analyzed attacks inside AWS, Microsoft Azure, Digital Ocean, Google Cloud, Rackspace and IBM SoftLayer.
Kremlin Hackers Are Exploiting Microsoft’s Unpatched Zero-Day
Russia’s politically motivated Fancy Bear group is actively using the flaw—and a patch won’t be available until Election Day.
Google to Distrust WoSign/StartCom Certificates
WoSign knowingly and intentionally mis-issued certificates in order to circumvent browser restrictions and CA requirements.
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.
MI5 Boss Warns of ‘Aggressive’ Russian Cyber Threat
Andrew Parker claims Kremlin is on the offensive
Google AI Can Create Its Own Encryption
Google Brain has shown that artificial intelligence has the ability to create its own cryptography standard, dynamically.