MonthMay 2019

New SOAP Attack Hits South African Home Routers

A huge wave of attacks is targeting home routers in South Africa for recruitment into a Hakai-based botnet.

Checkers Breach Underscores Continued POS Dangers

Attacks on point-of-sale terminals garners less attention these days, but the most recent breach of the restaurant chain shows hackers have not lost focus.

GDPR’s First-Year Impact By the Numbers

The latest statistics on GDPR spending, compliance rates, enforcement, and consumer attitudes on privacy protection.

Who watches the iOS parental control apps?

Children are emotional. Protecting them matters. When it comes to technology, do you want developers you don’t know over whom you have no control watching what your children do on their devices?

Apple doesn't

Apple recently cut developers off from using MDM software to drive third-party parental control solutions.

Developers were upset, and seventeen smaller developers you’ve probably never heard of got together just days before Apple’s WWDC 2019 conference with a well-organized PR campaign and a professional website to demand access to new API’s that let them develop parental control software for iOS.

To read this article in full, please click here

Who watches the iOS parental control apps?

Children are emotional. Protecting them matters. When it comes to technology, do you want developers you don’t know over whom you have no control watching what your children do on their devices?

Apple doesn't

Apple recently cut developers off from using MDM software to drive third-party parental control solutions.

Developers were upset, and seventeen smaller developers you’ve probably never heard of got together just days before Apple’s WWDC 2019 conference with a well-organized PR campaign and a professional website to demand access to new API’s that let them develop parental control software for iOS.

To read this article in full, please click here

SANS Launches Security Awareness Certification

The SANS Security Awareness Professional (SSAP) will be available this summer to professionals focused on measuring and mitigating human risk.

Focusing on Endpoints: 5 Steps to Fight Cybercrime

Follow these best practices to strengthen endpoint management strategies and protect company data.

Black Hat Q&A: Building Infosec Communities for Women

Three security experts offer a sneak peek into their upcoming Black Hat USA talk on organizing female infosec communities in Korea, Japan and Taiwan.

Vulnerability Leaves Container Images Without Passwords

A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.

2.3B Files Currently Exposed via Online Storage

Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018.