September 2017

Bashware cyber threat

Checkpoint has discovered a new attack method subbed “Bashware” that can allow hackers to bypass common security solutions with any known malware. The Bashware technique takes advantage of a new Windows 10 supported feature “Subsystem for Linux (WSL).”   The new WSL feature allows Windows users to use popular bash terminal and run native Linux

Bashware cyber threat Read More »

BlueBorne: Bluetooth cyber attacks

Security researchers have disclosed multiple Bluetooth vulnerabilities that could threaten billions of smartphones from Android and Apple and millions of Internet of Things (IoT) devices, such as smart TVs, printers and others that may use the Bluetooth wireless protocol.

BlueBorne: Bluetooth cyber attacks Read More »

Introduction to Information Security: 11 Key Takeaways

In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline “An Introduction to Information Security” for individuals looking to get a better understanding of introductory information security best practices.

Introduction to Information Security: 11 Key Takeaways Read More »

10 Critical Security Controls For GDPR Readiness

These 10 critical yet practical data security controls can help your small or mid-sized business safeguard sensitive data and be better prepared for the General Data Protection Regulation (GDPR), soon to become effective May 25th, 2018. As we highlighted in our last article, GDPR: 10 Key Highlights From The New EU Regulations, we included some important takeaways

10 Critical Security Controls For GDPR Readiness Read More »