The integration of the cloud into global Internet and business strategies is the critical next step towards our officially entering the Digital Age. Advances in how we gather, share, and consume information have not only transformed business, but also society itself. In fact, we are now so accustomed to change that we adopt it and adapt to it without a second thought. And we have to.
read more
5 Security Lessons Learned in 2016
Ringing in a More Secure 2017
read more
Obama to Announce Retaliation Against Russia for Election Hacks
read more
Continue readingChinese Traders Charged With Trading on Information Stolen from Hacked Law Firms
The Securities and Exchange Commission (SEC) on Tuesday charged three Chinese men for trading on information stolen from two prominent New York-based law firms they hacked in 2014 and 2015.
read more
FDA Releases Guidance for Medical Device Cybersecurity
The U.S. Food and Drug Administration (FDA) has released guidance on the postmarket management of cybersecurity for medical devices, encouraging manufacturers to implement security controls that cover products throughout their entire life cycle.
read more
InterContinental Hotels Investigating Possible Card Breach
British multinational hotel company InterContinental Hotels Group (IHG) has launched an investigation after being informed of a possible payment card breach at some of its properties in the United States.
read more
Vulnerabilities Plague PHP 7’s Unserialize Mechanism
PHP 7’s “unserialize” function is plagued by a series of vulnerabilities that could allow an attacker to take full control over affected servers, Check Point security researchers reveal.
read more
Destructive KillDisk Malware Turns Into Ransomware
A recently discovered variant of the KillDisk malware encrypts files and holds them for ransom instead of deleting them. Since KillDisk has been used in attacks aimed at industrial control systems (ICS), experts are concerned that threat actors may be bringing ransomware into the industrial domain.
read more
Massive Attack from New “Leet Botnet” Reaches 650 Gbps
New Leet Botnet Shows IoT Device Security Regulation May Become Necessary
read more
Five New Year’s Resolutions for the InfoSec Community
This time every year I tell myself the same thing: “You’ve got to cut back on the drinking.” But I’m not about to listen to some weirdo who talks to himself. Yet, I want to make some kind of resolution! What’s left of the professional in me has some ideas about resolutions that we, as a security community, can make. Here are five.
read more


