Malware Meets SysAdmin Automation Tools Gone Bad This post was authored by Alex Chiu and Xabier Ugarte Pedrero. Talos recently spotted a targeted phishing attack with several unique characteristics…
Britains stance on cyber crime
Britains stance on cyber crime is like driving a car without airbags Information sharing is critical to mitigating the corrosive and systemic risk of cyber crime, something that the UK…
Top Five Information Security Errors Made By SMEs
There are many information security threats facing businesses, and it can be especially tough at the SME level. Small and medium enterprises are exposed to the same threats as larger…
Aviva phone hacker jailed for 18 months
Aviva phone hacker jailed for 18 months over revenge attack Esselar co-founder pwned insurance biz after spat with former colleagues By John Leyden A senior techie has been jailed for…
Researcher cracks Ashley Madison passwords
Researcher cracks 4000 Ashley Madison passwords and they are pretty stupid BY ABHISHEK AWASTHI 123456 password qwerty, ashley, are the top passwords used on Ashley Madison (Cysec note: we have…
Neither prevention nor detection alone sufficient
What would you do differently if you knew you were going to be robbed? By Michael Sentonas Losing irreplaceable photos, laptops without current backups, and heirloom jewelry are among the…