Britains stance on cyber crime is like driving a car without airbags Information sharing is critical to mitigating the corrosive and systemic risk of cyber crime, something that the UK…
Day: September 6, 2015
Top Five Information Security Errors Made By SMEs
There are many information security threats facing businesses, and it can be especially tough at the SME level. Small and medium enterprises are exposed to the same threats as larger…
Aviva phone hacker jailed for 18 months
Aviva phone hacker jailed for 18 months over revenge attack Esselar co-founder pwned insurance biz after spat with former colleagues By John Leyden A senior techie has been jailed for…
Researcher cracks Ashley Madison passwords
Researcher cracks 4000 Ashley Madison passwords and they are pretty stupid BY ABHISHEK AWASTHI 123456 password qwerty, ashley, are the top passwords used on Ashley Madison (Cysec note: we have…
Neither prevention nor detection alone sufficient
What would you do differently if you knew you were going to be robbed? By Michael Sentonas Losing irreplaceable photos, laptops without current backups, and heirloom jewelry are among the…
Critical vulnerability in SAP Afaria MDM
Advisory describing a critical buffer overflow vulnerability in SAP Afaria MDM server that can disable access to corporate systems for millions of mobile users was published today at the ERPScans…