The OURSA Security Conference Calls Out Lack of Inclusion
250 people gathered in the event space of Cloudflare’s San Francisco headquarters for an unusual security conference—or, perhaps more …
250 people gathered in the event space of Cloudflare’s San Francisco headquarters for an unusual security conference—or, perhaps more …
In his keynote presentation at RSA Conference in San Francisco on April 17 2018, Brad Smith, President at Microsoft, told the audience that …
Communication from the cybersecurity department to the board should consider their expertise and context – and not use jargon. Speaking …
The Fakebank malware comes back, with its new Fakebank malware variant that intercepts the Android users’ banking incoming and outgoing …
Researchers at Purdue University and the University of Iowa have just exposed a list of LTE vulnerabilities that could create quite a …
Prescribing a Software Bill of Materials On November 16th, U.S. Congressman Greg Walden (R-OR) sent a letter to the …
Today, sensitive data is everywhere, continuously changing, moving and being accessed by people inside and outside your organization. The …
Federal courts must end the excessive secrecy surrounding law enforcement surveillance orders, a U.S. Senator urged in a letter on …
66% of professionals use the same passcodes to dial-in to calls for up to a year or more which, as is the case when failing to regularly …
In an attempt to protect Android users from malware and shady apps, Google has been continuously working to detect and remove malicious …
US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption …
Twilio’s documentation provides guidance on best security practices, but researchers found that 686 apps from 85 developers exposed …
Marissa Mayer today publicly apologized for two massive data breaches at Yahoo during her tenure as CEO of the company, and blamed Russian …
T-Mobile USA is warning some customers that they could be targeted by hackers looking to hijack their SIM cards. According to reports, the …
The information security industry needs to adopt rational models rather than emotional ones for risk management, according to the Deputy Assistant Director of the FBI, Donald Freese. During the opening…
A data breach at credit reporting bureau Equifax has exposed sensitive data on a staggering 143 million US consumers and evoked widespread concern about consequences for victims that could last…
The UK and Ireland need to form a joint cyber-task force to deal with the growing online threat to both nations in a post-Brexit world, a leading industry non-profit has…
Tech Industry Calls for Open Immigration to Ease Skills Crisis UK tech and information security experts have warned the government that restricting immigration unnecessarily post-Brexit will only harm an industry…
#RSAC: Australia Calls to Fight Back Against Attempts to Control Internet The Australian Ambassador for Cyber Affairs insists that in order to reap the enormous economic growth opportunity that cyberspace…
Female hackers still facing various forms of harassment. Facebook’s security chief wants everyone to call it out and make cybersecurity inclusive. Read full news article on Forbes.com
“The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia”, said Australian Prime Minister Malcolm Turnbull today. He has been…
Security researchers have discovered a new method to decrypt satellite phone communications encrypted with the GMR-2 cipher in “real time” — that too in mere fractions of a second in…
Online sextortion against children is extensive, under-reported, poorly understood, and growing. In response, Europol has simultaneously published a report with recommendations on how to tackle the problem, and launched a…
The starting point for a new study from the Institute for Critical Infrastructure Technology is not new: “There are only two types of networks, those that have been compromised and…
Today’s topics include Microsoft’s president calling on governments to stop the practice of stockpiling software flaws; TIBCO Software’s acquisition of data science platform maker Statistica; Google’s implementation of the EU’s…
Microsoft emphasizes the need for new security policies as IoT growth heightens the consequences of cyberattacks. Microsoft is urging for the development of cybersecurity policies to support the rapid growth…
The major story from last week was that malware, described in leaked NSA documents, crippled Windows computers worldwide. The WannaCry Ransomware virus is believed to have hit 200,000 victims in…