Software component session timeout

Are you kidding ? We edit a software component, we take time to create all the command lines, and after that, when I click on OK Session Timeout All the command lines were created ! You can...

Thales report highlights growing concern about data breaches

Organizations from various industries across the globe are increasingly hip to the magnitude of the problem posed...

You should pick your Android security app wisely, test shows

It’s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously A recent test of anti-malware apps available in...

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a...

Trend Micro fixes serious vulnerabilities in Email Encryption Gateway

Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a remote...

Huge ransomware outbreak disrupts IT systems worldwide: WannaCryptor to blame

Ransomware called WannaCryptor spread rapidly around the world today, encrypting files in as many as 100 countries by using the leaked NSA eternalblue SMB exploit. That escalated quickly! For those of you who did...

Buyers Beware of Tampered Gift Cards — Krebs on Security

Prepaid gift cards make popular presents and no-brainer stocking stuffers, but before you purchase one be on the lookout for signs that someone may have tampered with it. A perennial scam...

Android trojan drops in, despite Google’s Bouncer

ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with an interesting addition: the application was bundled with another application. We at ESET recently discovered...

How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? There’s nothing new about advertisers and app developers using deceptive practices, but the Touch ID scam...

How devsecops protects appsec from the cybersecurity skills gap

In an analysis of ESG’s annual survey on the state of IT, security analyst Jon Oltsik reports that in 2018, respondents “once again” ranked cybersecurity skills as their #1 most problematic IT skills...

LATEST NEWS

MUST READ