Security News

Dev fears sub-domain abuse – Plus, unofficial patches for trio of Windows zero-days Microsoft has been accused of ignoring an IT security risk that could be exploited to create legit-looking...

A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes. read more

Winston is an online privacy device that sits between a modem and router to protect the user's online browsing and identity.

Security researchers have been warning about a simple technique that cybercriminals and email scammers are already being using in the wild to bypass security features of Microsoft Office 365,...

Winston is an online privacy device that sits between a modem and router to protect the user's online browsing and identity.

Phishing attacks have become more targeted and sophisticated and also show a focus on enterprises, cloud-based Internet security services provider Cyren says. read more

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the...

Office 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, which makes it the preferred...

Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign appears to be attacking...

It's like a greatest hits album of terrible security policies Stop us if you've heard this one: A Flash zero-day vulnerability is being actively targeted in the wild.…