How to protect your Mac and your iPhone

Most of us who don’t use Android smartphones use Apple products like iPhone and Mac PCs or laptops. While most Mac users still think that thier PCs and smartphones are malware and virus proof, there are some serious vulnerabilities like Spectre and Meltdown CPU flaws. The flaws are rather technical bug it is important for […]

Lack of cyber hygiene leaves 90% of businesses vulnerable to hacks

The vast majority of businesses are recording exploits for vulnerabilities that are three or more years old, with just over half reporting 10 year old vulnerabilities. Read about the new report by Fortiguard which found that there were a total of 184 billion exploit detections, 62 million malware detections and 2.9 billion botnet communications attempts […]

Attacks exploiting software vulnerabilities are on the rise

Attacks conducted with the help of exploits are among the most effective as they generally do not require any user interaction, and can deliver dangerous code without arousing user suspicion. Read about the new report by Kaspersky Lab which reveals that there were 702 million attempts to launch an exploit in 2016 – an increase of […]

Emerging cybersecurity vulnerabilities

Read Dwight Davis’article about emerging vulnerabilities on CSO Online : One unfortunate aspect of human psychology involves how people tend to deal with potential threats. As long as the threats are more abstract than actual, all too often we reason that there’s no rush to build defenses against them. Only after a threat materializes and […]

Recovering from a Data Breach: 3 Steps to Combat Vulnerabilities

Have you ever encountered a data breach which has exposed the vulnerabilities of your entrepreneurial setup? Are you worried about the lingering cybersecurity threats, looming large within an organizational hierarchy? In this post, we will be focusing on the techniques to combat data breaches while containing the damage in extreme cases. Read more about three steps your business […]

Overload: Critical Lessons from 15 Years of ICS Vulnerabilities

In the past several years, a flood of vulnerabilities has hit industrial control systems (ICS) – the technological backbone of electric grids, water supplies, and production lines. These vulnerabilities affect the reliable operation of sensors, programmable controllers, software and networking equipment used to automate and monitor the physical processes that keep our modern world running. […]

Slow Down On Lawful Hacking Frameworks and Fixes

Read Dave Altel’s article on the slowdown in lawful hacking frameworks and bug fixes on Lawfare Blog : “Lawful hacking” is an interesting and potentially very useful future path for law enforcement and the intelligence community. But lawyers and policymakers rushing to address potential problems are getting ahead of the technology. Read his full article […]

Cybersecurity blind spots: Mitigating risks and vulnerabilities

Read Sean Martin’s article about with security experts on how to overcome cyber security blind spots on Tech Targets : Technical blind spots certainly present major information security challenges to CISOs and their teams, as the complexities of monitoring encrypted traffic and updating SAP software and other legacy applications can be daunting tasks. Read his full […]

4 new areas of security vulnerability created by the Internet of Things

Read Ben Rossi explain four new areas of security vulnerability created by Internet of Things on Information Age : The ongoing proliferation of personal computer technology and internet access has changed the face of virtually every industry on Earth, but it’s only the dawn of a new age of connectivity. Read his full article here.

A quarter of Windows devices open to hack

A quarter of all Windows devices, including tablets, computers and smartphones, are open to 700 vulnerabilities because enterprises have failed to update Internet Explorer (IE) at a company wide level. Read the new report called Trusted Access 2016 by Duo Security which reveals that 72 per cent of Java users are running an out-of-date version of the […]