Google: 80% of Android apps encrypt traffic by default
Slow progress on encrypting Android app communications, but it's finally picking up pace.
Slow progress on encrypting Android app communications, but it's finally picking up pace.
The realities of supply and demand apparently triggered a rise in the price of Android exploits, so much so that they're now more expensive than iOS exploits.
GitHub's token scanning service now scans tokens issued by most major cloud providers.
With the threat climate continuing unabated, the impact of increasing volumes of attacks – and increasing pressure to stop them – has taken its own toll on CSOs who, iOOF Holdings head of cybersecurity and technology risk Ashutosh Kapsé noted, suffer from high burnout rates, job-related physical and mental health issues, loss of a sense of purpose, and constant fears for their jobs.
David Braue | 14 Jun | Read more
After Apple blocks Titan keys on iOS devices. Bluetooth might not have been such a good idea after all.
They may have exfiltrated personal data by different means, but this week’s successful compromise of Westpac’s PayID service highlights the continuing threat faced by organisations whose business relies on collecting large volumes of sensitive information.
David Braue | 06 Jun | Read more
The employment market is hungry for “future focused” executives with the ability to manage cybersecurity risk at the board level, according to a recent jobs market update that also found employers put a premium on executives who understand the need to continually test systems through regular red-teaming and penetration testing.
David Braue | 29 May | Read more
Four popular vendors' VPNs offer hackers a way to replay private sessions.
The cybersecurity industry has responded positively to the cybersecurity measures within the 2019 federal Budget, which have been spearheaded by an unquantified “cyber uplift” to bolster government security and protect the upcoming election from compromise.
David Braue | 03 Apr | Read more
G Suite admins demand a way to prevent staff from using SMS codes to sign into Google accounts.
Growing business engagement with issues around cybersecurity risk means the CISO function should ideally be moved out of the IT organisation, a senior security policy advisor has argued as organisations increasingly adopt business-level controls on growing software-as-a-service (SaaS) adoption.
David Braue | 23 Jun | Read more
Shady practices by a Chinese digital marketing firm has left 250 million PCs at risk of being fully comprised.
Twitter has suspended at least two accounts that were spreading links to spyware aimed at people who sympathise with terrorists.
Telstra is “still working on” calculating the cost of reliably securing the mass of metadata that will be collected under the government's controversial telecommunications data retention legislation, the company's chief information security officer has confirmed.
David Braue | 18 Mar | Read more
The CSO Security Buyers Guide 2010 digital edition is now available for download. Download this digital magazine (PDF) for reviews, interviews, company profiles, and more security research resources.