Advertisement

Scanning for vulnerabilities.

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks.


A white speech bubble with an email icon indicating a new unread message against a viral background.

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now.


Advertisement

mobile connection endpoint protection laptop shield

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out.


5g faq

5G security gaps in Australia: What CSOs can do

The security of 5G networks now being rolled out is a mess, and could be a vector for new forms of cyber attacks. But there is a radical solution.


Security administration  >  A shield protects a network of users and systems.

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing.


CSO  >  Botnet

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

The sophisticated botnet also has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks.


FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.


A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.


Gourav Mukherjee, managing partner, Immersion Security

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.


Advertisement

A hacker targets a sitting duck  >  easy target / easy pickings / victim targeting

With all eyes on coronavirus, Australia should brace for cyber crime surge

Nation-states likely to use cybercriminal attacks against Australia, others for strategic gain during COVID-19 distraction.


COVID-19 coronavirus / network of vectors

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.


Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.


Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.


Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

Zoom's use of insecure system APIs allow attackers to elevate privileges as well.