MonthMarch 2018

Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch

Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.

Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch

Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.

Accused LinkedIn, DropBox Hacker Appears in US Court After Diplomatic Battle

Russian national indicted for the 2012 LinkedIn hack that led to the theft of 117 million passwords has been extradited from the Czech Republic to the US.

10 Women in Security You May Not Know But Should

The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.

Under Armour App Breach Exposes 150 Million Records

A breach in a database for MyFitnessPal exposes information on 150 million users.

The Cybersecurity Mandates Keep On Coming

There's a good reason for the proliferation of mandates like the one in New York state, but companies may struggle to answer this question: "Are we in compliance?"

The Cybersecurity Mandates Keep On Coming

There's a good reason for the proliferation of mandates like the one in New York state, but companies may struggle to answer this question: "Are we in compliance?"

Facial recognition tech moves from smartphones to the boardroom

Facial recognition technology, which has begun to gain traction on mobile devices like the iPhone X and various Android smartphones, could soon show up at work – and at the airport.

The technology uses a person's face to authenticate their identity,  making it a potentially important security tool.

In 2015, Google launched its "Trusted Face" feature as part of its Android 5.0 Lollipop update. Trusted Face, part of Android's Smart Lock technology, works in the same way as Apple's Face ID, which replaced the Touch ID fingerprint reader on the iPhone X.

To read this article in full, please click here

MITRE Evaluates Tools for APT Detection

A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.

Deconstructing the DOJ Iranian Hacking Indictment

The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years.