July 21, 2016 Petya Ransomware Upgrades Its Crypto 2 min read - The new version of the Petya ransomware features the proper implementation of Salsa20 as well as a more complex preprocessing algorithm.
July 21, 2016 HTTPoxy Can Enable Man-in-the-Middle Attacks 2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
July 20, 2016 Cybersecurity Training for BT Security Employees to Include CISSP and SSCP 2 min read - BT Security will offer its employees the opportunity to pursue ISC2's professional certifications during their cybersecurity training.
July 19, 2016 Phone Verification May Not Catch Premium Number Costs 2 min read - Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
July 19, 2016 Inside the Bunker at Wimbledon 2016 2 min read - IBM's security experts are dedicated to protecting the Wimbledon brand and its reputation as one of the premier tennis tournaments in the world.
July 19, 2016 Lucky Green Packs It In at Tor 2 min read - Lucky Green, one of Tor's earliest participants, has decided to leave the Tor project. Green will terminate the Bridge Authority.
July 18, 2016 Proof of Compromise? New Neutrino Exploit Runs on Research 2 min read - A new proof of concept (PoC) for a previously patched Internet Explorer vulnerability has made its way into the Neutrino exploit kit.
July 18, 2016 Cyberattacks From Outside the Perimeter Are Costly, Ponemon Institute Finds 2 min read - A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
July 18, 2016 IBM MaaS360 Achieves Certification for Compliance With ISO 27001 Standards 2 min read - IBM MaaS360 achieves certification for compliance with ISO 27001 standards, exemplifying leadership as the most trusted and secure SaaS EMM solution.
July 14, 2016 Shard: Password Peace of Mind or Potential Problem? 2 min read - Shard is designed to help users track down and eliminate duplicate passwords. But what happens if cybercriminals repurpose the protective program?