Critical Android Flaw Leads to ‘Permanent DoS’

The December security update stomped out critical denial-of-service (DoS) and remote-code-execution (RCE) vulnerabilities in the Android operating system. Continue reading Critical Android Flaw Leads to ‘Permanent DoS’

Update WhatsApp now: MP4 video bug exposes your messages

A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now. Continue reading Update WhatsApp now: MP4 video bug exposes your messages

How Mature is Your Security Automation? See the Survey Results and How You Compare.

We hear a lot about security orchestration, automation, and response.  It will help us with our security skills gap.  It will improve our operational efficiency, thus reducing mean time to detect and respond to incidents.  It will give us more time for… Continue reading How Mature is Your Security Automation? See the Survey Results and How You Compare.

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime, a new study has suggested. Law enforcement interventions The study, by researchers from the Universit… Continue reading Targeted online messaging dissuading young gamers from getting involved in cybercrime

Email is an open door for malicious actors looking to exploit businesses

There’s an alarming scale of risks businesses are up against in a time when email is proving an open door for cybercriminals and malicious actors looking to disrupt, exploit and destroy businesses, according to Wire. The report is developed in co… Continue reading Email is an open door for malicious actors looking to exploit businesses

The Legacy Of The Floppy Still Looms Over Windows

We no longer use floppy disks on the vast majority of computers, but a recent Old New Thing blog post from Microsoft sheds light on one of their possible unexpected legacies. It seems Windows disk cache items expire after two seconds, and as the post explains this has its origin …read more

Continue reading The Legacy Of The Floppy Still Looms Over Windows

3 Types of Network Attacks to Watch Out For

Cybersecurity is becoming more of a common tongue term in today’s industry. It is being passed around the executive meetings along with financial information and projected marketing strategies. Here are some common attack vectors plaguing the ind… Continue reading 3 Types of Network Attacks to Watch Out For