Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
cyberpress 2h
BrandPost: Cybersecurity Best Practices for Protecting Brand Trust Thanks to CSOonline for this story Your brand is a valuable asset, but it’s also an attack vector. Threat actors exploit the public’s trust of your brand whe…
Reply Retweet Like
Help Net Security Nov 27
Reply Retweet Like
Spitfire Network Services Dec 1
Working from home gives us flexibility but it also comes at a risk. Read the 10 steps to cyber security by the National Cyber Security Centre here
Reply Retweet Like
cyberpress 4h
Phishing campaign threatens coronavirus vaccine supply chain Thanks to TechRepublic for this story The emails impersonate a member company of the COVID-19 vaccine supply chain to harvest account credentials, says IBM…
Reply Retweet Like
cyberpress 13h
TrickBot gets new UEFI attack capability that makes recovery incredibly hard Thanks to CSOonline for this story Researchers have seen a worrying development recently in TrickBot, a botnet that serves as an access gateway int…
Reply Retweet Like
cyberpress 5h
6 security predictions that will impact healthcare in 2021 Thanks to TechRepublic for this story Attacks against COVID-19 vaccine developers will continue, while more reports will surface about patient data leaks in …
Reply Retweet Like
cyberpress 15h
How a nightmare wormable, wireless, automatic hijack-a-nearby-iPhone security flaw was found and fixed Thanks to TheRegister for this story You're probably all patched by now, which is just as well A Google securit…
Reply Retweet Like
Genetec Inc. Nov 28
Find out how you can encourage your employees to understand the importance of strong and how to better protect your organization against in this article:
Reply Retweet Like
Tom Lawrence Odg Nov 27
8 Resolutions For A More Secure And Rewarding New Year.
Reply Retweet Like
cyberpress 13h
How attackers exploit Window Active Directory and Group Policy Thanks to CSOonline for this story Active Directory, part of Windows Server since Windows 2000, is the foundation for many, many businesses. It allows firms to a…
Reply Retweet Like
Tom Lawrence Odg 7h
Former NSS Labs CEO Launches New Security Testing Organization.
Reply Retweet Like
Help Net Security 16h
Reply Retweet Like
cyberpress 9h
Android devs: If you're using the Google Play Core Library, update it against this remote file inclusion CVE. Pronto Thanks to TheRegister for this story You should have done that in April anyway, says Check Point, …
Reply Retweet Like
cyberpress 10h
Popular Android apps still vulnerable to patched security flaw Thanks to TechRepublic for this story Cybercriminals can exploit the at-risk apps to steal login credentials, passwords, financial details, and text mess…
Reply Retweet Like
David Lammert Dec 1
Reply Retweet Like
cyberpress 10h
ACLU sues US govt, demands to know if agents are buying their way around warrants to track suspects' smartphones Thanks to TheRegister for this story 'Cos that would be against the Fourth Amendment, legal team says …
Reply Retweet Like
Digitech Security Solutions ltd Dec 1
New telecoms security law to protect UK from cyber threats Telecoms companies in the UK must follow tougher security rules or face fines of up to ten per cent of turnover, under a new law laid in Parliament.
Reply Retweet Like
cyberpress Nov 24
Google binned two apps by China’s Baidu after researchers spotted personal data leakage Thanks to TheRegister for this story Palo Alto Networks spotted subscriber IDs and MAC addresses on the move Infosec researche…
Reply Retweet Like
Risk Xtra Nov 27
Reply Retweet Like
Help Net Security Nov 28
Reply Retweet Like