Security

Introduction to the NIST CyberSecurity Framewor for a Landscape of Cyber Menaces

The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of…

9 years ago

Moving threat landscape: The reality beyond the cyberwarfare

It started quietly as a probability not a reality. Now within months cyberwarfare has become a reality plausible as the…

9 years ago

Cyber Risk and Cyber Insurance – Insurance challenge to the CIO as corporate Cyber Security Effectiveness manager

[By Cesare Burei, Margas on courtesy of @CLUSIT – Rapporto Clusit 2017 - All right reserved] Until the corporate Risk…

9 years ago

Japan plans to develop a hack-proof satellite system

Japan plan to develop a hack proof satellite system to protect transmissions between satellites and ground stations with a dynamic…

9 years ago

Turla hacking group continues to improve its Carbon backdoor

The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a…

9 years ago

FBI Cyber Division warns the healthcare industry of FTP attacks

The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) warns the companies in the healthcare industry of FTP…

9 years ago

British interior minister says IT companies should stop offering a “secret place for terrorists to communicate”

British interior minister Amber Rudd believes encryption implemented by messaging services is offering a dangerous opportunity for terrorists to communicate.…

9 years ago

Security updates fix critical vulnerabilities in Flash player and Shockwave player

Adobe patches vulnerabilities in Flash Player and Shockwave for Windows, Mac, Linux and Chrome OS. Adobe issued security updates for…

9 years ago

How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the…

9 years ago

High severity bug discovered in CISCO NETFLOW GENERATION APPLIANCE

A flaw in Cisco NetFlow Generation Appliance tracked as CVE-2017-3826, could be exploited by an unauthenticated, remote attacker to cause a DoS condition.…

9 years ago

This website uses cookies.