February 28, 2017 Cloudflare Bug Creates Customer Data Leak Concerns 2 min read - Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
February 28, 2017 Researchers Detect New Attacks Against MySQL Database 2 min read - Analysts found that MySQL databases had been attacked by a ransomware campaign similar to the one that affected MongoDB databases in January.
February 28, 2017 End-to-End Email Encryption: Google Pushes Latest Project to Open Source 2 min read - Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?
February 27, 2017 Linux Update Fixes 11-Year-Old Flaw 2 min read - A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
February 27, 2017 Collision Attack Sounds the Death Knell for SHA-1 Cryptographic Function 2 min read - Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
February 27, 2017 Hurry Hard? Not For Hackers: Security Controls Fall in Less Than 12 Hours 2 min read - A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
February 24, 2017 New India Security Agency Will Support the Fight Against Cybercrime 2 min read - An India security agency is set to launch this June in response to the significant rise in digital transactions taking place across the nation.
February 23, 2017 Researchers Find Clues in Windows Mirai Botnet Spreader Code 2 min read - Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
February 23, 2017 Browser Bully? Malicious Google Chrome Extension Pushes User Buttons 2 min read - A malicious Google Chrome extension is making the rounds to deliver malvertising. Here's how it works and how to avoid getting scammed.
February 22, 2017 PHP Will Incorporate Libsodium for Crypto 2 min read - Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.