News

  • Own a Nexx “smart” alarm or garage door opener? Get rid of it, or regret it

    PRIVACY PRIVACY Hacker can remotely open or close garage doors, seize control of alarms, and switch on (or switch off) customers’ “smart” plugs due to vulnerabilities in Nexx products. Read More

    Read More

  • Google Mandates Data Deletion Policy For Android Apps

    PRIVACY PRIVACY Developers have until December 7 to submit answers to data deletion questions Read More

    Read More

  • How to Protect Yourself From Phishing Scams

    PRIVACY PRIVACY Ping, it’s a scammer!  The sound of an incoming email, text, or direct message has a way of getting your attention, so you take a look and see what’s up. It happens umpteen times a week, to the extent that it feels like the flow of your day. And scammers want to tap…

    Read More

  • Securing Medical Devices is a Matter of Life and Death

    PRIVACY PRIVACY The cybersecurity challenges of the Internet of Medical Things (IoMT) are still largely unanswered Read More

    Read More

  • Research on AI in Adversarial Settings

    PRIVACY PRIVACY New research: “Achilles Heels for AGI/ASI via Decision Theoretic Adversaries“: As progress in AI continues to advance, it is important to know how advanced systems will make choices and in what ways they may fail. Machines can already outsmart humans in some domains, and understanding how to safely build ones which may have…

    Read More

  • CREST publishes guide for enhancing cyber resilience in developing countries

    PRIVACY PRIVACY International information security accreditation and certification body CREST has published a new guide to fostering financial sector cyber resilience in developing countries. The nonprofit’s Resilience in Developing Countries paper forms part of its work in encouraging greater cyber readiness and resilience in emerging nations to help protect key industries from cyberattacks. The guide…

    Read More

  • Identity and Access Management (IAM) in Payment Card Industry (PCI) Data Security Standard (DSS) environments.

    PRIVACY PRIVACY This is the first of a series of consultant-written blogs around PCI DSS. Many organizations have multiple IAM schemes that they forget about when it comes to a robust compliance framework such as PCI DSS. There are, at minimum, two schemes that need to be reviewed, but consider if you have more from…

    Read More

  • Prolific Spanish Teen Hacking Suspect Arrested

    PRIVACY PRIVACY Jose Luis Huertas boasted of accessing 90% of Spaniards’ info Read More

    Read More

  • Two-Fifths of IT Pros Told to Keep Breaches Quiet

    PRIVACY PRIVACY The figure rises to 70% of those in the US Read More

    Read More

  • Cyber threat intelligence programs: Still crazy after all these years

    PRIVACY PRIVACY When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and strategic purposes. Smaller, resource-constrained and SMB organizations often recognized the value of threat…

    Read More

News, Advisories and much more

Exit mobile version