15.8 C
London
Friday, August 18, 2017

9 Of The Biggest Bug Bounty Programs

These programs stand out for the size of their rewards and how much they have paid in total to security researchers in bounties over the last several years.

Breaches Are Coming: What Game of Thrones Teaches about Cybersecurity

Whether you're Lord Commander of the Night's Watch or the CISO of a mainstream business, it's not easy to defend against a constantly evolving threat that is as deadly as an army of White Walkers.

SonicSpy Authors Spin Out Over 1,000 Spyware Apps

The actors behind this new malware family created a sizable selection of malicious apps in just over seven months, some of which appeared on Google Play.

6 Ways CISOs Can Play a Role in Selling Security

When customers ask tough questions about data security, business service resilience, privacy, regulatory, and reputational risk it's best to remain upbeat and positive. Here's how.

SMBs Practice Better IoT Security Than Large Enterprises Do

Small-to midsized businesses are more prepared than big ones to face the next IoT attack: good news given the sharp rise in IoT botnet attacks in the first half of 2017, new reports released today show.

Carbon Black Refutes Claims of Flaw in its EDR Product

Endpoint security firm responds to DirectDefense's report, noting that the information was shared voluntarily via a feature in the product that comes disabled by default.

Two Iranians Face Charges for Computer Hacking, Credit Card Fraud

Federal prosecutors charged two Iranian nationals with identity theft and use of stolen credit card numbers as well as threatening to expose the breach to one of the victim's customers.