NSS Labs fires off anti-malware-testing lawsuit at infosec toolmakers
NSS Labs has thrown a hand grenade into the always fractious but slightly obscure world of security product testing by suing multiple vendors as well as an industry standards organisation. A lawsuit...
View ArticleUnscaled 6: Do Not Pass Go: New Monopolies in the Age of AI
The proliferation of AI is spurring calls for regulation. But what should these new rules look like? Who will enforce them? And does AI require a new definition of monopoly? Historically, monopolies...
View ArticleReport Shows Increased Cybersecurity for Voter Registration in US
According to a report by theCenter for Election Innovation and Research (CEIR) nonprofit, shows that voter registration databases (VRDBs) are more secure in 2018, with most states involved in the...
View ArticleHow to Keep Your Cryptocurrency Safe: 10 Common Mistakes to Avoid
If you own any cryptocurrency, you’ll need to adapt to a new way of keeping your money safe. You can’t just keep your Bitcoins under the bed or deposit your Ether in a bank (at least, not yet). So what...
View ArticleE-Commerce Security Planning for Disasters
This is the last post in our series on E-commerce Security: Intro to Securing an Online Store Part 1 Intro to Securing an Online Store Part 2 Today, let’s expand on some of the suggestions made during...
View ArticleCryptojacking surges and here’s what to do about it | Avast
In the bustling industry of cybercrime, ransomware has always been a popular weapon of choice…until this year. In 2018, illicit cryptomining (AKA cryptojacking) took the title, surging 459% ....
View ArticleRetail industry continues to struggle with cybersecurity
A new report from risk rating organization SecurityScorecard finds that the retail industry is the second lowest performer in terms of application security. SecurityScorecard continually monitors more...
View ArticleMany organisations still aren’t GDPR compliant. Are you one of them?
It’s been four months since the EU GDPR (General Data Protection Regulation) came into force, but it seems many organisations still aren’t compliant. Some may have been waiting to see what fines the...
View ArticleTurn the NIST Cybersecurity Framework into Reality: 5 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs. The first version of the National Institute of Standards and...
View Article30+ Startups Helping Enterprises Protect Your Personal Data
Enterprise data security needs an upgrade, andsoon. Since January 2017, roughly6 billion confidential digital records have been stolenworldwide. Butnow, startups are rising to the challenge. The common...
View ArticleNewegg September 2018 credit card breach: Everything you need to know
Read this Newegg September 2018 credit card breach: Everything you need to know Card info entered between August 14 and September 18 is potentially compromised. Joe Maring 20 Sep 2018 Newegg, the...
View ArticleFitbit-based life insurance is a potential privacy and security nightmare
John Hancock is one of the oldest and most established insurance companies in the United States. According to Reuters, it’s also the first US insurance company to ditch traditional life insurance...
View ArticleAlexa Guard alerts you when it hears glass breaking or the smoke alarm
Amazon today introduced about a dozen different devices, including a new Echo Dot and Echo Show , as well as several new features such as Alexa Guard, which sends users notifications when their Echo...
View ArticleIntroducing Ring’s First Indoor/Outdoor Security Cameras: Ring Stick Up Cams
Continuing its mission to reduce crime in neighborhoods, Ring is adding new security cameras to the Ring of Security. SANTA MONICA, Calif. & SEATTLE (BUSINESS WIRE) #AlwaysHome ― Ring , a company...
View ArticleBSA urges judicial oversight, challenge mechanism for encryption bill
Global software industry advocate BSA, the software alliance, has urged the Australian Government to include in its encryption bill a judicial oversight and challenge mechanism in order to ensure that...
View ArticleMining Round-Up: New Bitfury Chip, Anti-Cryptojacking Botnet Discovered
Mining 7 mins ago| By Samuel Haig - | Mining Round-Up: New Bitfury Chip, Anti-Cryptojacking Botnet Discovered In recent news pertaining to cryptocurrency mining, Bitfury has announced a “suite” of...
View ArticleEveryday crypto
I’ve come to understand there are just a few reasons why security exploits tend to occur in software systems. They are: stupidity (thoughtless coding) ignorance (using the wrong tools) unusual...
View ArticleSolo, open source FIDO2 security key
Solo Solo is an affordable security key that implements FIDO2/U2F and supports USB, NFC, and extensions. Extensions include SSH, GPG, and cryptocurrency. Solo is an upgrade to U2F Zero and is a work in...
View ArticleQuantum Computers are the Future Nukes of the IT World
It is no wonder that the quantum computing investments in the U.S ., China , and elsewhere are ramping. Now that the technology is moving from research to practice, governments are banking on having...
View ArticleRetail Sector Second-Worst Performer on Application Security
A "point-in-time" approach to PCI compliance could be one reason why so many retailers appear to be having a hard time. The retail industry's cybersecurity preparedness continues to lag behind almost...
View Article