A week in security (June 22 – 28)

A roundup of cybersecurity news from June 22 – 28, inlcuding a zero day guide, tax season tips, and web skimmers using image files.

Read more

The passwordless present: Will biometrics replace passwords forever?

The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?

Read more

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

Several countries are introducing a cybersecurity labeling scheme to inform consumers about the security features of IoT devices and force manufacturers to improve these features.

Read more

A week in security (December 23 – 29)

A roundup of cybersecurity news from December 23 – 29, including a retrospective look at trends in online privacy legislation in the US.

Read more

Fake Elder Scrolls Online developers go phishing on PlayStation

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Read more

New version of IcedID Trojan uses steganographic payloads

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Read more

IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Read more

A week in security (October 14 – 20)

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Read more

When can we get rid of passwords for good?

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Read more

Medical industry struggles with PACS data leaks

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Read more

Select your language