News

  • Smartphone Alternatives: Ease Your Way into Your Child’s First Phone

    PRIVACY PRIVACY “But everyone else has one.”  Those are familiar words to a parent, especially if you’re having the first smartphone conversation with your tween or pre-teen. In their mind, everyone else has a smartphone so they want a one too. But does “everyone” really have one? Well, your child isn’t wrong.   Our recent global…

    Read More

  • Remediant wants to move beyond PAM to secure enterprise networks

    PRIVACY PRIVACY Security software provider Remediant wants to move beyond basic privileged access management (PAM) to help CSOs secure enterprise networks. It’s adopting a new approach it calls PAM+, aimed at helping enterprises protecting access to their systems and build on Zero Trust initiatives. Tim Keeler, CTO and co-founder of Remediant, set out the need…

    Read More

  • Clever Phishing Scam Uses Legitimate PayPal Messages

    PRIVACY PRIVACY Brian Krebs is reporting on a clever PayPal phishing scam that uses legitimate PayPal messaging. Basically, the scammers use the PayPal invoicing system to send the email. The email lists a phone number to dispute the charge, which is not PayPal and quickly turns into a request to download and install a remote-access…

    Read More

  • Over 900K Kubernetes clusters are misconfigured! Is your cluster a target?

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! Kubernetes is an amazing platform for managing containers at scale. However, a recent study found that over 900,000 Kubernetes clusters are vulnerable to attack because they are misconfigured! This means that…

    Read More

  • Smashing Security podcast #287: Lost in translation, spiders, and slapping tortillas

    PRIVACY PRIVACY We’re back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation. All this and much more is discussed in the latest edition of the award-winning “Smashing Security”…

    Read More

  • Dashlane launches integrated passkey support for password manager with new in-browser passkey solution

    PRIVACY PRIVACY Password management vendor Dashlane has announced the introduction of integrated passkey support in its password manager, unveiling an in-browser passkey solution to help tackle the issue of stolen/misused passwords. The launch comes as the “passwordless authentication” era edges closer with tech giants Apple, Google and Microsoft set to bring it to millions of…

    Read More

  • Pros and cons of cybersecurity automation

    PRIVACY PRIVACY Image Source: Pexels This blog was written by an independent guest blogger. Cybersecurity threats are nothing new. Major corporations and small businesses alike are regularly faced with them. However, as technology continues to advance and change, so do those threats. Technological sophistication is important when it comes to providing us with the advancements…

    Read More

  • Standards Body Publishes Guidelines for IoT Security Testing

    PRIVACY PRIVACY Document will help testers create benchmarks for security products Read More

    Read More

  • Detected Cyber-Threats Surge 52% in 1H 2022

    PRIVACY PRIVACY Trend Micro warns of Linux-based ransomware Read More

    Read More

  • Intro to MongoDB’s queryable encryption

    PRIVACY PRIVACY Queryable encryption was the main attraction at MongoDB World 2022, for understandable reasons.  It introduces a unique capability to reduce the attack surface for confidential data in several use cases.  In particular, data remains encrypted at insert, storage, and query.  Both queries and their responses are encrypted over the wire and randomized for…

    Read More

News, Advisories and much more

Exit mobile version