February 9, 2023
Via: The Hacker NewsA set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different vendors that could pose a significant attack surface for threat actors looking to exploit operational technology (OT) environments. “Threat actors […]
December 19, 2022
Via: TechradarHundreds of Android applications being distributed through the Google Play Store have been found leaking Application Programming Interface (API) keys, putting users at risk of identity theft(opens in new tab) and other threats. The risks were found by cybersecurity researchers […]
October 7, 2021
Via: The Hacker NewsThe U.S. government on Wednesday announced the formation of a new Civil Cyber-Fraud Initiative that aims to hold contractors accountable for failing to meet required cybersecurity requirements in order to safeguard public sector information and infrastructure. “For too long, companies […]
July 19, 2018
Via: DailyMailA new feature added in the recent Gmail redesign could present an ’emerging threat’ to users, US intelligence officials have warned. The new feature, known as ‘Confidential Mode’, could leave an increased number of users susceptible to attacks from cyber […]
May 2, 2018
Via: ZDNetA severe vulnerability in a widely used industrial control software could have been used to disrupt and shut down power plants and other critical infrastructure. Researchers at security firm Tenable found the flaw in the popular Schneider Electric software, used […]
Application areas, Finance, Online Tools
February 9, 2018
Via: Market WatchThe stock market’s volatility this week is old hat for seasoned investors — but for novices using low-cost micro-investment apps it prompted concern. And some say that these apps could unintentionally promote investing behaviors that could put those users at […]
December 28, 2017
Via: VMBlogEnterprises are deploying more cloud services, embracing DevOps, leveraging on-premises applications and exploring other productivity and cost optimization solutions. As a result, it is becoming harder for them to know who within the organization has access to what and how […]
November 2, 2015
Via: itCuratedThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks. Some services are more risky than others, however. Skyhigh ranked 16,000 different cloud service providers based on whether they encrypted data, respected customer privacy […]
September 1, 2015
Via: itCuratedMozilla’s mission is at risk. That, in turn, could put the entire Web at risk. Mozilla, the foundation behind the Firefox Web browser, may declare in its mission statement that “the Internet is a global public resource that must remain […]
March 20, 2015
Via: itCuratedThreat Horizon report The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the ISF (Information Security Forum) — a nonprofit association that assesses security and risk management issues on behalf of its members […]