Cyber Security News

September 2018

61.

Hank Green on the Darker Side Of Internet Fame

62.

The State Of Network Security in Organizations with 1000+ Employees

63.

You Should Prepare for the Next Mega Data Breach

64.

Downloads Of Known Vulnerable Open Source Components Increase 120%

65.

Most Enterprises Now Running Windows 10, Security Hygiene No Longer Optional


What's the worst that could happen?
(Hint: Your trade secrets could be stolen...)


66.

Should N.Y.'s Strict Cyber Security Rule Be a Model for the Country?

67.

Notorious Hackers Serve SpicyOmelette to Unsuspecting Victims

68.

How the Dark Web Could Hurt the Midterm Elections: Campaign 2018

69.

This Simple Scam Is Exposing Politicians to Hackers: Campaign 2018

70.

Overhauled Brave Browser Beta Gets Max Privacy with Tor-powered Private Tabs



71.

Half Of US States Using Voting Machines with a Known Vulnerability, Says Report

72.

Voting Machines Are Vulnerable to Hacking: Campaign 2018

73.

Do You Have an iPhone for Work? It May Have a Security Flaw That Leaks Info

74.

Phorpiex Worm Pivots to Infect the Enterprise with GandCrab Ransomware

75.

How Automakers Are Tackling Connected Vehicle Vulnerability Management


Outwitting the bad guys? We can help.


76.

Fancy Bear LoJax Campaign Reveals First Documented Use Of UEFI Rootkit in the Wild

77.

Widely Used Voting Machine Still Vulnerable

78.

11th Circ. Reignites Suit Over Website Access for the Deaf

79.

US Judge Sides with CFTC in Fraud Case, Ruling Cryptos Are Commodities

80.

How Australia Can Help the US Make Democracy Harder to Hack


What's the worst that could happen?
(Hint: Your trade secrets could be stolen...)


81.

Despite Mounting Threats, Cyber Security Spending Is Low Among Candidates

82.

Blockchain Is No 'Magic Wand' for Cyber Security

83.

Business Is at Inflection Point for Proactive Cyber Security

84.

Explosion in Fake Data-stealing Shopping Sites

85.

Norwegian State Discusses Vulnerabilities with IT Sector



86.

Replication Won't Protect VMs Against Ransomware

87.

Best Supply Chain Firms Are Masters Of Data and Automation

88.

Homeland Security Wrestles with Defending a Disappearing Network Perimeter

89.

Russian Hackers Use Malware That Can Survive OS Reinstalls

90.

Secret Service Warns Of Surge in ATM 'Wiretapping' Attacks

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you