News

A flaw in vCard processing could allow hackers to compromise a Win PC

A security expert discovered a zero-day flaw in the processing of VCard files that could be exploited…

Experts unveil a “to-do” list of pressing cybersecurity challenges for 2019 and further

Key players, including public bodies, need to take a proactive approach and lead the way in adopting…

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Zurich American Insurance Company is refusing to refund its client because consider the attack as “an act…

A Guide to Cybersecurity Conversations For the C-Suite In 2019

In 2019, drive more business value from your cybersecurity investments. It’s easy to get caught up in…

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using…

Security Product Spotlight: datashur Pro – encrypted USB device

I was invited by iStorage (https://istorage-uk.com) to test their datashur PRO USB storage device. It looks a…

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

Kaspersky was a long accused to support Russian intelligence, in an ironic turn, source now revealed it…

Youngster behind massive data leak of German politicians data

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians….

Overcoming the Cybersecurity Staffing Drought

Companies won’t ever be able to hire enough qualified pros. Partnering with full-service cybersecurity providers is now…

JW’s Signature Cybersecurity Conference comes to The George Washington University

On January 31, 2019 on The George Washington University campus at the Jack Morton Auditorium, The GreenHouse…

Show Buttons
Hide Buttons