home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Adjesty

SHARESHARESHARE
Adjesty develops and markets innovative Brand Protection and Ad Quality SaaS products for Digital Publishers, AdTech companies and Affiliates.
SHARESHARESHARE

RELATED NEWS


Effectively immediately, developers are not permitted to upload extensions with crypto-currency mining features, company says. Google is making it harder for cyber-criminals to use Chrome browser extensions for crypto-currency mining. Effective immediately Google will no longer allow developers to upload crypto-currency mining browser extensions to the Chrome Web Store. Extensions with crypto-currency mining functions that are already in Chrome store will be delisted sometime in late June. The c...
EWEEK
READ MORE

Two popular IoT communications protocols are riddled with vulnerabilities and systemic issues which are exposing countless global organizations to industrial espionage, targeted attacks and DoS, according to Trend Micro. The security giant’s latest report, The Fragility of Industrial IoT’s Data Backbone, focuses on two of the most popular machine-to-machine protocols in use today: Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). As security is n...
INFOSECURITY MAGAZINE
READ MORE

"
Cyber-criminals have been discovered abusing free certificate generation tool Let’s Encrypt to hide malware from security scanners and legitimize malicious sites.

Trend Micro fraud researcher, John Chen, explained in a blog post that his team saw the tool used in a malvertising attack leading Japanese victims to sites hosting the Angler exploit kit, in order to infect them with a banking trojan."...

WWW.INFOSECURITY-MAGAZINE.COM
READ MORE

Chinese hackers have launched supply chain attacks against three gaming companies in order to spread malware far and wide across Asian endpoints, according to ESET. The security vendor’s malware researcher, Marc-Etienne M.Léveillé, wrote in a blog post on Monday that the attacks are the work of the well-known Winnti Group, which has used such tactics before. It targeted two gaming titles and a “gaming platform application," compromising them with the same backdoor ...
INFOSECURITY MAGAZINE
READ MORE

More than half of IT security professionals think they will be hit by a state-sponsored attack in the next six months, with 48% not confident their staff could spot the presence of a hostile intruder, according to new research....
INFOSECURITY MAGAZINE
READ MORE

ATM machines have been back in the news of late, highlighting the various fraud campaigns that target them. NCR, a global ATM giant, says that the aging infrastructure that underpins most ATM machine networks almost guarantees a continued spike in things like skimming and jackpotting....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...