Infosecurity News

Israeli Researchers Jump the Air Gap with BitWhisper

Israeli Researchers Jump the Air Gap with BitWhisper

New technique could compromise maximum security computers

F-Secure Router Check Scans for Malicious DNS Activity

F-Secure Router Check Scans for Malicious DNS Activity

One-click tool can tell you if hackers have been redirecting your traffic

Multiple Digital Certificate Attacks Affect 100% of UK Businesses

Multiple Digital Certificate Attacks Affect 100% of UK Businesses

Researchers say a "Cryptoapocalypse" would dwarf Heartbleed in scope, complexity and time to remediate.

Vawtrak is Back and Stronger than Ever

Vawtrak is Back and Stronger than Ever

The financial trojan is targeting new countries and building a thousands-strong botnet, representing a top emerging threat.

Center for Internet Security Aims at AWS

Center for Internet Security Aims at AWS

Organizations can now leverage cloud-based resources configured for best-practice security controls.

UK Government Coughs Up £5m in Cybersecurity Funding

UK Government Coughs Up £5m in Cybersecurity Funding

Money will go into Belfast’s Centre for Secure Information Technologies

Buck Stops With Beijing Over Google MITM Attack

Buck Stops With Beijing Over Google MITM Attack

Intermediate ceritificate authority issued rogue digital certificates

New Report Promises Threat Intelligence 101

New Report Promises Threat Intelligence 101

MWR InfoSecurity and UK government offer guidance to firms

Twitch Faces Likely Hack—Millions of Gamer Accounts Affected?

Twitch Faces Likely Hack—Millions of Gamer Accounts Affected?

Passwords, email addresses, user names, home addresses, phone numbers and date of birth may have been accessed.

A Quarter of Businesses Have No Control over Network Privileges

A Quarter of Businesses Have No Control over Network Privileges

25% of companies can't manage privileged access, even though 50% have employees with access not necessary to their jobs.

ISACA Lays Out Forensics for the Data Breach Era

ISACA Lays Out Forensics for the Data Breach Era

ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations.