• img December 07, 2017

Apple users, it’s time for new security updates

Apple usually pushes out security updates for its various devices and software on the same day, but not this time. The iOS update was rushed out on Saturday because of a critical need to fix a bug in iOS 11 that caused some iPhones to crash when the calendar changed to December 2. The update […]

Read More
  • img December 07, 2017

Banking Apps Found Vulnerable to MITM Attacks

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile banking apps that left customers vulnerable to man-in-the-middle attacks.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/banking-apps-found-vulnerable-to-mitm-attacks/

Read More
  • img December 07, 2017

Global security spending to reach $96 billion in 2018

Gartner forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more on security as a result of regulations, shifting buyer mindset, awareness of emerging threats and the evolution to a digital business strategy. Security spending drivers “Overall, a large portion of security spending […]

Read More
  • img December 07, 2017

NiceHash suffers security breach, around $70 million in Bitcoin stolen

NiceHash, one of the most popular crypto-mining marketplaces, has apparently suffered a breach that resulted in the theft of the entire contents of the NiceHash Bitcoin wallet. “We are currently investigating the nature of the incident and, as a result, we are stopping all operations for the next 24 hours. We are working to verify […]

Read More
  • img December 07, 2017

What’s on the horizon for security and risk management leaders?

By 2022, cybersecurity ratings will become as important as credit ratings when assessing the risk of business relationships, Gartner analysts believe. They also predict that, by 2020, 60% of organizations engaging in M&A (mergers and acquisitions) activity will consider cybersecurity posture as a critical factor in their due diligence process. Cybersecurity posture With the mess […]

Read More