Security News

Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
2019-03-21 09:50

Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.

Business Email Compromise: Mitigating the Risk
2019-03-06 15:18

David Appelbaum of Valimail on Addressing VulnerabilitiesEmail remains a key vector for inbound attacks. David Appelbaum of Valimail explains how the threat can be remediated.

500,000+ WinRAR users open to compromise via a 19-year-old flaw
2019-02-21 10:17

A vulnerability affecting all versions of WinRAR, the popular file archiver utility for Windows, could be exploited by attackers to deliver malware via specially crafted ACE archives. About the...

Symantec helps business stop email compromise attacks
2019-02-18 07:30

Symantec, the world’s leading cyber security company, announced Email Fraud Protection, an automated solution that helps organizations block fraudulent emails from reaching enterprises, ensuring...

Business Email Compromises: The Growing Threat in Healthcare
2019-02-15 18:33

Business email compromise attacks are becoming far more common in the healthcare sector, says Rod Piechowski of the Healthcare Information and Management Systems Society, who discusses promising...

IoT credential compromise attacks open your devices up to spying
2019-01-24 14:44

Security updates for the lifespan of a given device are critical to protecting your connected device against hackers, according to a Barracuda report.

Unpatched vCard Flaw Could Let Hackers Compromise Your Windows PCs
2019-01-15 10:03

A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on...

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting
2018-12-16 18:26

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the...

Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits
2018-12-10 15:16

Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based...

Oz opposition caves, offers encryption backdoor compromise
2018-11-27 02:57

Mark Dreyfus offers to rubber-stamp legislation if only counter-terror agencies get decryption Mark Dreyfus, the Labor opposition's shadow Attorney General, has offered a compromise on Australia's...