Analysis Finds Flash Top Exploit Target as Adobe Fixes Latest Flaws
Adobe releases an update for 17 critical Flash vulnerabilities the day after an analysis finds that Flash is the most popular target of exploit kits. Software maker Adobe issued an update on Nov. 10 to...
View ArticleGang charged over JP Morgan cyber-fraud linked to a wave of online scams and...
Gang based in Israel and Russia charged with JP Morgan hack that compromised details 83 million customers
View ArticleTalkTalk claims that hack will only cost £35m
October hack to cost TalkTalk a trifling sum as it offers free upgrades to customers in a bid to keep them
View ArticleAeriandi Unveils New Line-up of PCI DSS Compliant Voice Services
Agent Pay, IVR Assist, Hosted Call Recording and Archive combine award winning customer experience with secure, PCI DSS compliant payment and storage solutions OXFORD, UK – November 11, 2015: Aeriandi,...
View ArticleFantasy football players may have had their PCs infected with malware
Barclays Premier League website was targeted by malvertising on the popular fantasy league section of its website, finds Malwarebytes ...
View ArticleTenable Raises $250M as Its Closed-Source Security Tech Prospers
A decade after Tenable made its Nessus vulnerability scanner closed-source, the company's founder explains why he believes he made the right decision. In October 2005, Ron Gula, CEO of Tenable,...
View ArticleHackerOne Names Open-Source Veteran Marten Mickos as CEO
Mickos discusses why he's excited about the security industry and how lessons learned in open source will help. Marten Mickos is a well-known technology executive in the open-source and cloud realms,...
View ArticleSenator FeinStein Pushes for Final Passage of Cyber-Security Bill
NEWS ANALYSIS: The long-awaited Cybersecurity Information Sharing Act is currently languishing in the hands of a committee that has yet to be named. WASHINGTON—Saying that losses to cyber threats could...
View ArticleDemand for Zero-Day Flaws Drives Bug Bounties to Exceed $1 Million
The Zerodium deal shows that market demand will readily support zero-day exploit code bounties of $1 million or more, security experts say. On Nov. 1, exploit-bounty program Zerodium announced that it...
View ArticleIoT Security a Focus at ARM TechCon Show
Through new products, keynotes and sessions, the message was that security needs to be a priority was developing for the Internet of things. SANTA CLARA, Calif.—ARM officials are looking to extend the...
View Articlemydesq selects Encap Security to boost productivity and engagement for wealth...
Oslo & Palo Alto, 12th November, 2015 – Encap Security, provider of uncompromising authentication for financial institutions, has today announced that mydesq, a high growth fintech firm, will...
View ArticleThreatStream To Exhibit At Cyber Security Summit In London
REDWOOD CITY, CA – November 12, 2015 – ThreatStream®, the leading provider of an enterprise-class threat intelligence platform, today announced ThreatStream (@threatstream) will be exhibiting at the...
View ArticleAdaptiveMobile enables significant new revenues for MTN Group through Grey...
Company expands African operations to work with 22 mobile operators across 18 countries DUBLIN AND DALLAS, 12 November, 2015 – AdaptiveMobile, the world leader in mobile network security, has today...
View ArticleDigital preservation goes mainstream as organizations look to safeguard...
Preservica reports surge in demand for digital preservation softwareDigital Preservation specialist, Preservica, has seen a 50% growth in new customer signings in the last six months, as organizations...
View ArticleCloudFlare Continues Effort to Spur DNSSEC Adoption
CloudFlare is now making it easier to secure DNS information as it helps to advance operational and standards efforts for DNSSEC adoption. The Domain Name System is core to the functional operation of...
View ArticleCoreOS Builds Open-Source Clair to Improve Container Security
Most users don't know if there are vulnerable components inside of containers; Clair will help solve part of that challenge. Containers offer users a new more optimized way to run virtualized...
View ArticleNew POS Malware Emerges in Time for the Holidays
What's old is new again. Older forms of point-of-sale malware are re-emerging along with new, never-seen-before variants. 'Tis the season for … malware? Ever since the Target breach was first revealed...
View ArticleDocker Doubles Down on Security With Nautilus, Hardware Encryption
Docker introduces multiple new security efforts in a bid to help make containers safer than ever before. BARCELONA, Spain—As Docker container adoption grows, so too does the need for robust security....
View ArticleSetting Up Best Practices for Container Security
Virtualization containers, with their extraordinarily efficient hardware utilization, can be a dream come true for development teams. While containerization will probably never entirely replace virtual...
View ArticleThales delivers high performance, low latency data protection for data in...
Datacryptor 5000 Series protects an organization’s most sensitive information with the most complete, high-speed security solution for data-in-motionCARTES SECURE CONNEXIONS, Paris, France and...
View Article