July 7, 2016 Microsoft Cybersecurity Advocates for Coordinated Norms 2 min read - The latest Microsoft cybersecurity initiative pushed for a more coordinated effort surrounding vulnerability disclosure and communication.
July 6, 2016 Out of the Office? Not Quite — Old Microsoft Vulnerabilities Still Wreaking Havoc 2 min read - A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
July 6, 2016 Android Encryption Fails Thanks to Qualcomm Chips 2 min read - A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
July 5, 2016 Firefox Security Gets a Boost Thanks to Tor 2 min read - Mozilla is expanding its Firefox security measures to include some preferences used by the Tor browser. Here's what that means for users.
June 30, 2016 Latest Ponemon Study Reveals More Enterprises Embracing an Encryption Strategy 2 min read - A recent survey from the Ponemon Institute detailed how organizations across industries are embracing an encryption strategy to protect critical data.
June 30, 2016 Symantec Vulnerabilities Are Severe, Require Immediate Action 2 min read - A security researcher at Google recently found more than two dozen severe Symantec vulnerabilities affecting several security products.
June 30, 2016 Crooked Cameras? New CCTV Botnet Drives Massive DDoS Attack 2 min read - Distributed denial-of-service attacks leveraging a new CCTV botnet allowed cybercriminals to continue their barrage of strikes 24/7.
June 28, 2016 Nuclear EK Shuts Down — What’s the Fallout? 2 min read - Now that both Angler and the Nuclear EK have been shut down, cybercriminals will have to search for a replacement to carry out their attacks.
June 28, 2016 POS Malware Delivers Credit Card Theft at Hundreds of Restaurants 2 min read - Customers may have gotten a lot more than a slice of pizza thanks to a POS malware called PunkeyPOS targeting hundreds of pizza restaurants in the U.S.
June 28, 2016 The Fansmitter Method: Stolen Data’s New Sound? 2 min read - Security researchers described a new method of data theft called Fansmitter, which uses cooling fans to slowly exfiltrate information.