Security

Identities under threat of exposure.
"7ev3n" encrypts files and demands 13 bitcoins.
iCloud loophole found.
RSA event asks security execs to reveal Twitter passwords 
 
Revealed: the worst passwords of 2015 
Star Wars features prominently among old favourites.
 
One-in-four would pay ransom to retrieve stolen data 
 
Hyatt discovers malware at 250 hotels 
 
SMEs still using Microsoft's older IE versions 
34 percent of small business using Internet Explorer.
 
Let's spam! David Bowie death exploited by cybercriminals 
Promptly launches social engineering campaign.
 
IoT doorbell leaks wi-fi passwords 
Latest security worry in smart appliances.
 
Scammers contact Dell customers with scary details 
No word from vendor even after months of complaints.
 
I hacked Citrix, says Russian hacker 
Millions of customer endpoints vulnerable if true.
 
Hold on, was OS X really the most vulnerable of 2015? 
 
Blackphone 1 vulnerability found 
No vendor is immune to security flaws.
 
The 10 coolest IoT products of 2015 
Was this the year for "Internet of Things"?
 
Apple OS X named most vulnerable software of 2015  
 
Cisco chat client vulnerable to man-in-the-middle attack 
 
Ransomware spreads to Linux servers 
 
Dell PCs vulnerable to exposing user information 
 
IBM, Oracle, Cisco certification manager hacked 
Investigation under way to check what info was accessed.
Sign up to receive CRN email bulletins
   FOLLOW US...
Polls
Does the ATO need to close tax loopholes?

Latest Comments
CRN Magazine

Issue: 345 | December 2015

CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.