Gmail Spam Campaign Annoying, Not a Hack

When users take a look through their sent messages, they aren’t always searching for an email they sent. The security-minded user is looking for any messages that they did not send out. That’s...

WebEx vulnerability could spread malware between colleagues

Companies should check they are running latest version of WebEx, and beware attacks via the road less travelled. A critical vulnerability has been found in Cisco’s WebEx conferencing software – widely used by businesses...

Is scraping files from a Freedom of Information website ‘hacking’? – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with the 2008 crash...

Akamai CSO Talks Cryptominers, IoT and the Reemergence of Old Threats | Threatpost

Google Play Boots Three Malicious Apps From Marketplace Tied to APTs ...

Securing Elections – Schneier on Security

Securing Elections Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the...

The Secret Ingredient to DevSecOps Success

Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.RSA CONFERENCE 2018 - San Francisco - As evident by the speaker...

McAfee vNSP and AWS Are Winning Combination for Enterprise and Federal Customers

Fun Facts: ECS stood up and managed the first security operations center at the White House. Today, ECS manages the world’s largest McAfee installation—employing just about every solution we make—for the U.S. Army. ECS...

How concerned should users be?

Some aspects of online tracking go beyond just website analytics All of us probably have some understanding that, on the internet, you’re never alone and nothing that you do is entirely secret....

Updates for BASS

Cisco Blog > Threat Research Threat Research This blog post was authored by Jonas Zaddach and Mariano Graziano. Cisco Talos has rolled...

LATEST NEWS

MUST READ