A week in security (July 16 – July 22)

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.
Categories:

Security world
Week in security

Tags:… Continue reading A week in security (July 16 – July 22)

What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?
Categories:

Security world
Technology

Tags: alexaassistant… Continue reading What’s the real value—and danger—of smart assistants?

5 ways to find and fix open source vulnerabilities

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can fi… Continue reading 5 ways to find and fix open source vulnerabilities

A week in security (July 9 – July 15)

A roundup of the security news from July 9 – July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more.
Categories:

Security world
Week in security

Tags: ad blockersandroid malwarecrypto miningdata breachdomestic … Continue reading A week in security (July 9 – July 15)

Block all or nothing to prevent ICO fraud?

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?
Categories:

Security world
Technology

Tags: ico fraudInitial Coin Offeringprot… Continue reading Block all or nothing to prevent ICO fraud?

A week in security (July 2 – July 8)

A roundup of the security news from July 2 – July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns.
Categories:

Security world
Week in security

Tags: crypto miningmacro-lessprojec… Continue reading A week in security (July 2 – July 8)

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Categories:

Business
Security world

Tags: breachcloudmanageme… Continue reading Can we trust our online project management tools?

A week in security (June 25 – July 1)

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.
Categories:

Security world
Week in security… Continue reading A week in security (June 25 – July 1)

A week in security (June 18 – June 24)

A roundup of security news from June 18 – 24 that includes the SamSam ransomware, DNS rebinding, a World Cup phishing campaign, and lots and lots of Android malware.
Categories:

Security world
Week in security

Tags: android malwareandroid… Continue reading A week in security (June 18 – June 24)