Certes Networks launches Observability as part of its encryption management solution

Certes Networks continues to bring new innovation and product features to its encryption management solutions and is proud to announce the launch of its Observability feature to deliver on its promise to keep data secure. Many organizations are in the Continue reading Certes Networks launches Observability as part of its encryption management solution

Share

£3.5 million investment to train the next generation of forensic scientists

Cranfield University is investing £3.5 million in the latest forensic science technology at its Cranfield campus. Building on Cranfield’s distinctive strength in defence and security, this forensic science teaching and research facility will be unparalleled in the UK. Students and Continue reading £3.5 million investment to train the next generation of forensic scientists

Share

Proof-of-concept code for a security flaw in Docker is now public- Comment

It has been reported that security researchers are urging Docker customers to upgrade to the latest version after detailing a proof-of-concept (PoC) attack exploiting a critical vulnerability, which could lead to full container escape. The CVE-2019-14271 flaw was fixed in Docker version 19.03.1, but if Continue reading Proof-of-concept code for a security flaw in Docker is now public- Comment

Share

Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems- Comment

It has been reported that one of Iran’s most active hacker groups appears to have shifted focus. Rather than just standard IT networks, they’re targeting the physical control systems used in electric utilities, manufacturing, and oil refineries. At the CyberwarCon conference today, a Microsoft Continue reading Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems- Comment

Share

Google and Android smartphone vulnerability lets attacker remotely control cameras

Forbes reported that the security research team at Checkmarx has discovered vulnerabilities affecting Google and Samsung smartphones, with the potential to impact hundreds of millions of Android users, the biggest to date. Researchers discovered a way for an attacker to take control of smartphone Continue reading Google and Android smartphone vulnerability lets attacker remotely control cameras

Share