Just last week, IronKey unveiled the Workspace W200, which is the brand’s most affordable Windows to Go USB drive yet. It’s a USB 3.0 SuperSpeed Windows To Go device that’s highly secure, easy to use, and features a lightweight but robust design. The W200 is top-notch performance-wise, as it boasts of maximum read speeds of […]
In an ideal digital world, people would be able to easily avoid spam and malware sites because they’ll be grouped together under a common top-level domain. But according to a new report from Blue Coat, such domain groupings do exist. Yes, they aren’t tagged as “.spam” or something blatantly obvious, but there are indeed top-level […]
By now, you’ve probably read about the hacking of AshleyMadison.com, the site that’s been helping married people cheat on their spouses. This led to the data leak of more than 30 million Ashley Madison users. The site has put up a bounty ($500,000 Canadian) for any information that would lead to the arrest and prosecution […]
According to a recent report, it takes approximately seven months before a company recognizes that it’s been or being hacked. And that’s seven months too long. As reported before, the volume of security threats that organizations deal with regularly are enormous, and that number is more likely to increase than decrease in the future. Examples […]
This is the alarming discovery of renowned security expert Billy Rios. He discovered that hackers could have the capability to shut down an airport’s security network just by using a laptop. And this is particularly dangerous, as criminals or terrorists may manipulate the system to conceal weapons from x-ray scanners or the like. What’s ironic […]
The threat of security breaches has risen to alarming levels and is expected to cost more than $1 billion, according to a report by The Australian. Moreover, the Australian Cyber Security Centre (ACSC) cautioned that such attacks have been unrelenting (which confirms the suspicions of a lot of IT managers today), noting that a 20% […]
About half of Australian IT managers believe their respective organisations are targeted by security attacks every week. More distressingly, one in eight of them think that they had been attacked in the past minute—which supports the idea that attacks are non-stop. These are the findings of a survey conducted by Centrify, an identity management firm, […]
Stanislav Skuratovich, a researcher at Check Point, recently set his sights on a malware called Matsnu, which is an x86 infector that serves as a backdoor after infiltrating a computer system. This malware is able to upload and execute any code—which could potentially encrypt files on disc or uncover sensitive data—on the infected system. The […]
Identifying which sites are infected by malware or are used for phishing attacks shouldn’t be a problem with the Acunetix Vulnerability Scanner v10. If you’re running a website, Acunetix will detect the sites that you shouldn’t be linking to. This is valuable, as linking to compromised websites may affect your site’s SEO. Acunetix utilizes the […]
As per the ruling of the Foreign Intelligence Surveillance Court, the National Security Agency may temporarily resume its program—which was once hidden from the public eye—of systematically collecting bulk records of Americans’ domestic phone calls. Naturally, the American Civil Liberties Union said that it would raise the issue to the United States Court of Appeals […]