Voice message notification email warning: it could be ransomware
Don't play voicemail messages from suspicious sources.
Don't play voicemail messages from suspicious sources.
At a private briefing held outside the main RSA Conference in San Francisco, a panel of experts discussed the value of cyber insurance and whether it meets the needs of businesses trying to protect themselves against the impact of a cyber breach.
Anthony Caruana | 04 Mar | Read more
A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that do often lack meaningful policies or security controls related to these devices.
Ellen Messmer | 25 Oct | Read more
With the surge in <a href="http://blogs.csoonline.com/hacktivism">hacktivism</a> and nation-state espionage in recent years, not to mention the continuing high levels of cybercrime, companies need better tools to evaluate the quality of any developer's code.
Robert Lemos | 29 Jun | Read more
The holiday season is often a time of reflection, a time for organizations to look back and ask themselves 'are we doing things right'.
As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. In February 2017, Tavis Ormandy of the Google Project Zero team exposed major memory leakage in Cloudflare’s Content Delivery Network (CDN) web caching services. It exposed all sorts of sensitive data, including passwords, authentication tokens and cookies. Although this is just one example of a cloud-oriented service with a major security issue (which, for the record, the company responded to immediately and remediated quickly), it demonstrates that all of us may have more exposure points than we realise.