A temporary fix is available for the Windows Graphics Device Interface (Windows GDI) vulnerability that was disclosed a couple of weeks ago.
read more
Shellshock Attacks Still Cheap and Easy: IBM
Two and a half years after being discovered, the Shellshock vulnerability continues to be abused in attacks, and for a good reason: it is a very cheap and easy attack, IBM says.
read more
Shamoon-Linked “StoneDrill” Malware Allows Spying, Destruction
Researchers at Kaspersky Lab have come across a new and sophisticated piece of malware that can be used for both cyber espionage and wiping an infected computer’s storage.
read more
From Automation to Intelligence – Humans Needed
When Data Isn’t Keenly Analyzed to Raise it to the Level of Finished Intelligence, it Can Only Answer the Questions an Organization Knows to Ask
read more
CrowdStrike Vs NSS Labs, Round 2: NSS Hits Back
In February 2017, endpoint protection firm CrowdStrike took the unusual step of suing independent product testing organization NSS Labs, "to hold it accountable for unlawfully accessing our software, breaching our contract, pirating our software, and improper security testing."
read more
What’s Next in Cybersecurity? Ripped From the RSA Conference Floor
The security industry wrapped up what has arguably become the most significant trade show in the security industry: RSA Conference. While it’s always interesting to see what challenges hold the industry’s attention and how vendors plan to address them, I find the most useful information comes from informal conversations with customers and industry colleagues as opposed to official booth presentations.
read more
RDP Tops Email for Ransomware Distribution: Report
The Remote Desktop Protocol (RDP) is an increasingly popular distribution vector among ransomware operators, so popular in fact that it appears to have surpassed email, recent statistics from Webroot suggest.
read more
Spammers Leak 1.4 Billion User Records
A company run by a couple of known spammers has unknowingly leaked a series of files containing sensitive information about its operations, including nearly 1.4 billion user records.
read more
Twitter Flaw Allowed Access to Locked Accounts
Twitter was until a few months ago affected by a vulnerability that could have been exploited to bypass the social media network’s account locking mechanism.
read more
Rockstar Games Launches Public Bug Bounty Program
Rockstar Games this week launched a public bug bounty program through HackerOne, after running it in private mode for more than nine months.
read more


