Security News

Pro-ISIS hackers: Tactics, methodology and tools (Help Net Security)
2016-04-29 13:15

While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously disparate pro-ISIS...

Attackers use open source security tools for targeted cyberespionage (Help Net Security)
2016-04-28 15:02

Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customized hacking tools or buying them from third-party suppliers on the criminal...

Software tools and services used to achieve ISO 27001 (Help Net Security)
2016-04-14 12:45

With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay out of the press and...

SideStepper Allows for MiTM Between iOS Devices, MDM Tools (Threatpost)
2016-03-31 14:41

Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to...

Companies still lack adequate data privacy tools (Help Net Security)
2016-03-17 14:30

93 percent of IT professionals agree that customer data privacy concerns are a critical issue at the C-level. Yet, only 9 percent percent believe current privacy and consent methods are adequate....