A recently detected phishing campaign designed to steal credit card information employed a series of attack tactics previously associated with malware distribution, Proofpoint security researchers reveal.
read more
Healthcare Industry Can Go Beyond Compliance to Achieve Better Security
The Healthcare Industry Has a complex Relationship with Security, Compliance, and Legislation
read more
“Signal” Uses Domain Fronting to Bypass Censorship
Open Whisper Systems informed users on Wednesday that the latest Android version of its secure messaging app Signal includes a feature designed to bypass censorship in some countries.
read more
Apple Extends HTTPS Deadline for iOS Apps
Apple informed iOS developers this week that it has decided to give them more time to ensure that their applications communicate over a secure HTTPS connection.
read more
Defending Against The Rising Threat of “Non-malware” Attacks
Severe non-malware attacks and ransomware are the two stand-out malicious behaviors of 2016. When combined, as they have been with the PowerWare extortion, the attack can be both dangerous and difficult to detect.
read more
Remotely Exploitable 0-Day Impacts NETGEAR WNR2000 Routers
Vulnerabilities in NETGEAR WNR2000 routers allow an attacker to retrieve the administrator password and take full control of the affected networking device, a security researcher has discovered.
read more
Boosting Your Threat IQ with Context
Computing pioneer Alan Kay once said, “Context is worth 80 IQ points.” On the IQ scale, where average is about 100 and Einstein is 160+, context could propel you into the genius category pretty handily. For cybersecurity professionals who know that the industry has no shortage of threat data, context is the lever that turns threat data into threat intelligence.
read more
Tales and Trends for the New Year
As 2016 comes to a close, the time is right to look back at the year to reflect on those security lessons we learned and to identify emerging trends.
read more
EU Court Slaps Down UK’s Investigatory Powers Act
The Court of Justice of the European Union (CJEU), the highest constitutional court of the EU, has effectively slapped down the UK's new Investigatory Powers Act. The court passed judgement on Wednesday in a case brought by Labour MP Tom Watson and others against the UK government's ability to require ISPs to retain all customer metadata for 12 months.
read more
Inflight Internet Provider Gogo Launches Bug Bounty Program
Inflight Internet and entertainment provider Gogo has announced the launch of a Bugcrowd-based public bug bounty program covering the company’s main websites.
read more


