Infosecurity News

Bug in New iOS Lets Attacker Access iPhone Pics

Bug in New iOS Lets Attacker Access iPhone Pics

iOS hacker Jose Rodriguez shares a proof-of-concept video of another VoiceOver bypass bug.

Execs Fear Orgs Unprepared for Incident Response

Execs Fear Orgs Unprepared for Incident Response

Lack of practicing cyber war games leaves employees at a loss when it comes to incident response, says Deloitte.

Tech Support Scams Decline as Consumers Get Savvy

Tech Support Scams Decline as Consumers Get Savvy

Microsoft stats also reveal drop in number losing money

Cybersecurity Salaries Rise 6% in One Year

Cybersecurity Salaries Rise 6% in One Year

Wage rise is double the national average

UK’s MoD Exposed in 37 Security Breaches: Report

UK’s MoD Exposed in 37 Security Breaches: Report

Redacted findings point to basic mistakes

UK Launches “World First” IoT Code of Practice

UK Launches “World First” IoT Code of Practice

Experts caution it doesn’t go far enough

Endpoint Attacks Increase as Patching Slows

Endpoint Attacks Increase as Patching Slows

Endpoint compromises up 20% from last year, finds Ponemon survey.

#Cyberrecoded: Get the Certification that is Right for You

#Cyberrecoded: Get the Certification that is Right for You

The need to understand what certification is most suited for a person

Octopus Targets Central Asian Diplomats

Octopus Targets Central Asian Diplomats

Malicious program for Windows gives attackers remote access, says Kaspersky Lab.

iPhone a Growing Target of Crypto-Mining Attacks

iPhone a Growing Target of Crypto-Mining Attacks

Coinhive attacks Apple iPhone and Safari browser, says Check Point

Attack Vectors Long Quiet Make Loud Q3 Comeback

Attack Vectors Long Quiet Make Loud Q3 Comeback

Cyber-criminals breathe new life into old tactics and techniques, says Malwarebytes.

#Cyberrecoded: Students Should Get Involved to Get Hired

#Cyberrecoded: Students Should Get Involved to Get Hired

New employees discuss how to get ahead in getting a first job in cyber

What’s Hot on Infosecurity Magazine?