IoT messaging protocol is big security risk
Popular IoT messaging protocol lacks encryption and sufficient device authentication security.
Popular IoT messaging protocol lacks encryption and sufficient device authentication security.
FedEx says systems are still down after Petya attacks as UK bank Lloyds spots cyber insurance opportunity.
Cybersecurity pundits have been talking about strategies to boost cooperation amongst the various elements of the industry to reach common goals around information protection.
David Braue | 17 Jul | Read more
Google puts developers who abuse Android permissions on notice.
Businesses that continue to prioritise perimeter security over data protection will face a day of reckoning when a perfect storm of new regulations comes into effect next year, security experts have warned as new research finds that more than half of Australian businesses admit they’ll fail to meet deadlines for compliance.
David Braue | 12 Jul | Read more
Microsoft's Patch Tuesday has its first security update for the HoloLens headset.
Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.
Taylor Armerding | 11 Jul | Read more
The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
Taylor Armerding | 11 Jul | Read more
A disgruntled former employee, used off-the-shelf tools to destroy files and cause mayhem for Navarro Security
Christopher Burgess | 11 Jul | Read more
The role of artificial intelligence in improving security defences has expanded dramatically in recent years – but it may have expanded a bit too far, with a UK court blasting the provision of patient healthcare data to Google’s DeepMind for analysis.
David Braue | 10 Jul | Read more
Even weak attackers can pull off a password reset man-in-the-middle attack by getting you to register at a new website.
Microsoft has developed a new Controlled folder access feature that allows admins to whitelist apps that can access files in specific folders.
Comparisons of an old version of Petya and the this week's Petya suggest money was not the motivation.
Ransomware sweeps the globe with the same exploit as WannaCry but is better designed.
Microsoft lifts the time limit on its Edge bug bounty program
Microsoft has hit back at claims it using dirty tactics to encourage Windows 10 users to switch to its built-in antivirus system Windows Defender.
Developers are demanding answers from Apple after a $400-a-month iPhone VPN become a top grossing app on the App Store.
Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?
David Braue | 08 Jun | Read more
Security researchers are pressing ahead with a problematic plan to pay for access to monthly dumps from the murky Shadow Brokers operation.
You won't have to remember your Microsoft password ever again with the new Microsoft Authenticator app.