Smarter Vendor Security Assessments: Tips to Improve Response Rates

I have been on the receiving end of many vendor security assessments from customers and prospects.  Here are some tips to increase the likelihood that you’ll get a timely, usable response to the next vendor security assessment that you send … Continue reading Smarter Vendor Security Assessments: Tips to Improve Response Rates

Cyber preparedness essential to protect EU from large scale cyber attacks

The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. Preparing for major cross-border cyber-attacks To prepare for major cross-border cyber… Continue reading Cyber preparedness essential to protect EU from large scale cyber attacks

New Service Scans Chrome Extensions for Vulnerabilities and Privacy Risks

Over the past few years, hackers have increasingly abused Google Chrome extensions to steal people’s data, inject rogue ads into websites or hijack CPU power to mine cryptocurrency. Now, a new online scanning service aims to shed more light on t… Continue reading New Service Scans Chrome Extensions for Vulnerabilities and Privacy Risks

Wire shares results of independent security audit of its secure messaging apps

When I last spoke to Alan Duric, co-founder and (at the time) CEO of the company developing secure messaging application Wire, he stressed the importance of independent and regular security audits of software. The company had already previously engaged… Continue reading Wire shares results of independent security audit of its secure messaging apps

How secure are cryptocurrency mobile apps?

Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? Judging by the results of a recent audit by High-Tech Bridge, the chances are slim… Continue reading How secure are cryptocurrency mobile apps?

Google Chrome most resilient against attacks, researchers find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. However, the attack surface of modern web browsers is increasing due to new technologies and the increasing complexity of web browsers themselves,” noted Markus Vervier, … More Continue reading Google Chrome most resilient against attacks, researchers find