February 11, 2016 Danger on the Perimeter! About the Cisco ASA Vulnerability 2 min read - Cisco disclosed a vulnerability alert for their Adaptive Security Appliances (ASAs). The accompanying Cisco ASA alert should be of major concern.
February 11, 2016 Logical Consequences: Siemens Plugs High-Severity PLC Gaps 2 min read - Siemens recently came under fire for high-severity vulnerabilities in some of its PLCs, highlighting a broader problem with IoT.
February 10, 2016 Google Announces Plan to Flag Unsecured Emails 2 min read - Google's Gmail now alerts users when they receive unsecured, unencrypted and unauthenticated emails in an attempt to increase security awareness.
February 10, 2016 APT Groups Roundup: Handling the New Scam Influx 2 min read - APT groups are growing bolder, adding more tools to their arsenals and expanding their target list. Here's what you should know about these major threats.
February 10, 2016 Bitcoin Lending Site LoanBase Hacked Through WordPress Vulnerability 2 min read - Cybercriminals exploited a WordPress vulnerability to breach LoanBase, a bitcoin lending site, and they may have gained access to user info.
February 8, 2016 Google Extends Safe Browsing to Fake Buttons 2 min read - Chrome's safe browsing setting will now warn users about embedded content, such as fake download buttons, that aims to carry out social engineering.
February 8, 2016 TeslaCrypt Ransomware Targets WordPress Sites 2 min read - WordPress sites are being affected by a Teslacrypt ransomware attack, which could leave users with out-of-date plugins or browsers exposed.
February 8, 2016 Hacking the Hackers: Dridex Banking Malware Tapped to Deliver Free Antivirus 2 min read - A white-hat hacker may have found a way to replace delivery of the Dridex banking Trojan with a free antivirus program.
February 8, 2016 Adverse Learning Conditions? Educational Hidden Tear Ransomware Gets 24 Not-So-Friendly Spinoffs 2 min read - The Hidden Tear ransomware was intended to be educational, but cybercriminals have used it to create malicious, functional malware.
February 5, 2016 Are You Ready to See Your IAM Vision Come to Life? 2 min read - IBM is proud to introduce IBM IdentityDev, a platform that allows you to contribute, collaborate and help shape the future of IAM solutions.