Mobile SIMs Hacks Cause Concern

Blog Sep 20, 2016 Robert Siciliano
Profile photo of Robert Siciliano

A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can t...

Read More | Join the discussion!

US Confident in Election Security Despite Threats

Blog Sep 18, 2016 Grazielle J
Profile photo of Grazielle J

The US homeland security chief said Friday authorities have confidence in the integrity of electoral systems despite growing cybersecurity threats. Depart...

Read More | Join the discussion!

Flaw Allows Hackers to Alter “Signal” Attachments

Blog Sep 17, 2016 Grazielle J
Profile photo of Grazielle J

Vulnerabilities discovered by a couple of researchers in the Android version of the secure messaging application Signal can be exploited by remote hackers ...

Read More | Join the discussion!

How to digitally detox on Vacation

Blog Sep 16, 2016 Robert Siciliano
Profile photo of Robert Siciliano

Many years ago when you were on vacation, before Facebook, Instagram and Twitter were invented (assuming you were an adult then), you had a great time, rig...

Read More | Join the discussion!

Claroty Emerges from Stealth Promising ‘Extreme Visibility’ into Industrial Networks

Blog Sep 14, 2016 Grazielle J
Profile photo of Grazielle J

Claroty Makes Public Debut With $32 Million in Funding to Protect Critical Infrastructure Israeli cybersecurity startup Claroty has exited stealth mode t...

Read More | Join the discussion!

Predators use Emojis to target Kids

Blog Sep 13, 2016 Robert Siciliano
Profile photo of Robert Siciliano

Who’d ever think those silly little yellow circular faces and other such cyber symbols would become such a worldwide smash? I’m talking about emotico...

Read More | Join the discussion!

Cybersecurity Isn’t the Only Kind of Security SOCs Must Deal With

Blog Sep 13, 2016 Grazielle J
Profile photo of Grazielle J

Successful Attacks Can Blend Both Cyber and Physical Elements Seamlessly to Compromise an Enterprise You’ve seen it before in movies like Ocean’s Elev...

Read More | Join the discussion!

Managed Security Services, a Mission and Service Evolution

Blog Sep 11, 2016 Grazielle J
Profile photo of Grazielle J

Faced with a proliferation of security products and point solutions to combat increasingly sophisticated threats, it didn’t take long for companies to re...

Read More | Join the discussion!

Unpatched Flaw in Cisco Products Triggered by Research Project

Blog Sep 9, 2016 Grazielle J
Profile photo of Grazielle J

Cisco has disclosed the existence of a vulnerability that can be exploited by remote attackers to cause some of the company’s Application Control Engine ...

Read More | Join the discussion!

Another Successful Ransomware Attack

Blog Sep 8, 2016 Robert Siciliano
Profile photo of Robert Siciliano

Ransomware thieves sure know how to pick their victims—institutions that store loads of highly critical data that they need on a daily basis, that withou...

Read More | Join the discussion!

More