Keeping 2 billion Android devices safe with machine learning

Google Play Protect provides in-the-moment protection from potentially harmful apps (PHAs), but Google's protections start earlier. Before they're published in Google Play, all apps are rigorously analyzed by our security...

Ahead of GDPR, Information Governance Comes into Its Own | Threatpost

LAS VEGAS – In sharp contrast to a year ago, a full 98 percent of US enterprises in a survey from the Information Governance Institute have embarked on information governance...

GDPR, WHOIS & the Impact on Merchant Risk Security …

The EU's General Data Protection Regulation will make it harder for law enforcement, forensic investigators, and others to track down everything from credit card fraud to child porn rings.On May...

VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR

Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries. Source link

VPNFilter EXIF to C2 mechanism analysed

On May 23 2018, our colleagues from Cisco Talos published their excellent analysis of VPNFilter, an IoT / router malware which exhibits some worrying characteristics. Some of the things which...

Bitcoin Gold hit by double-spend Attack, exchanges lose over $18 millionSecurity Affairs

An unknown hacker made over $18 Million worth of BTG (Bitcoin Gold) powering “double spend” attacks on the Bitcoin Gold cryptocurrency network. The attacks...

James Comey: FBI Faces Deep Tech-Related Questions | Threatpost

LAS VEGAS – The American law enforcement system is facing a crisis of identity in the face of technology advancement, with cloud migration and automated systems, data privacy and encryption...

Test your site for the latest WordPress plugin XSS vulnerabilities

We have recently added a bunch of new security tests to Detectify, so you can now check your WordPress site for XSS vulnerabilities in popular plugins like Ninja Forms and...

5 top trends in endpoint security for 2018

<!--5 top trends in endpoint security for 2018 | CSO Online

APLICATIONS

The Hackable? Podcast Is Back For Season Two

Your car’s key fob makes it so easy to lock and unlock your car. But could this little device leave your...

HOT NEWS