News February 2017 - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – January 2026
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Category: News February 2017

Yahoo offers new details on breaches to Senate committee

Posted onFebruary 28, 2017December 23, 2020

Since Yahoo disclosed two mega-breaches late last year, its executives have met almost daily with CEO Marissa Mayer for working sessions focused on improving the company’s cybersecurity posture. Employees have also received weekly security presentations from Yahoo CISO Bob Lord Read More …

CategoriesNews February 2017TagsC-Suite, CXO, Data Breach

Google Discloses Another ‘High Severity’ Microsoft Bug

Posted onFebruary 27, 2017March 18, 2017

Google Project Zero disclosed Monday a “high severity” vulnerability it found in Microsoft’s Edge and Internet Explorer browsers that could allow remote attackers to execute arbitrary code. The revelation adds yet another vulnerability to a growing list of known bugs Read More …

CategoriesNews February 2017TagsMalware

Even bakeries get hit by hackers, top insurer warns ‘ill-equipped’ small businesses

Posted onFebruary 27, 2017July 14, 2018

Bakers are not immune from the hacking epidemic spreading across Europe, a top insurer has warned. Hiscox boss Bronek Masojada said small businesses faced just as much risk as large ones from cyber crime – but many did not have Read More …

CategoriesNews February 2017TagsCybercrime, Food and Agriculture, Hacking

Boeing Notifies 36,000 Employees Following Breach

Posted onFebruary 27, 2017July 14, 2018

A Boeing employee inadvertently leaked the personal information of 36,000 of his co-workers late last year when he emailed a company spreadsheet to his non-Boeing spouse. News of the breach surfaced earlier this month after a letter (.PDF) from Boeing’s Read More …

CategoriesNews February 2017, Front pageTagsData Breach, Data Theft, Personal Information, USA

Treason charges against Russian cyber experts linked to seven-year-old accusation

Posted onFebruary 26, 2017July 14, 2018

Treason charges brought in December against two Russian state security officers and a cyber-security expert in Moscow relate to allegations made by a Russian businessman seven years ago, according to the businessman and a source connected with the investigation. They Read More …

CategoriesNews February 2017TagsCyber Espionage, Cybercrime, Russia

Could cybersecurity sink your next M&A?

Posted onFebruary 26, 2017December 23, 2020

Most CFOs don’t expect to see cybersecurity on their due diligence checklist for mergers and acquisitions. Yet cybersecurity – or a lack thereof – has massive implications for any deal: after all, the average data breach now costs organisations in Read More …

CategoriesNews February 2017, Front pageTagsBanking and Finance, C-Suite, CXO

Cloudbleed: How to Protect Yourself After the Data Leak

Posted onFebruary 25, 2017March 18, 2017

Cloudflare revealed a bug in its code caused sensitive data to leak from major websites that use its services, including big names such as Uber, Fitbit, 1Password, and OkCupid. There are an estimated 4.2 million domains using Cloudflare, which may Read More …

CategoriesNews February 2017TagsCloud Security

NSA snoops told: Get your checkbooks and pens ready for a cyber-weapon shopping spree

Posted onFebruary 25, 2017July 14, 2018

NSA and US Cyber Command boss Mike Rogers has revealed the future direction of his two agencies – and for the private sector, this masterplan can be summarized in one word. Kerching! Speaking at the West 2017 Navy conference on Read More …

CategoriesNews February 2017, Front pageTagsCyber Weapon, Government, USA

NATO Warns Cyber Attacks Are a Threat to Democracy Itself

Posted onFebruary 24, 2017March 18, 2017

NATO is showing concern about the impact of cyber attacks, considering that they are a threat to individuals and organizations, but also to the fundamental nature of democracy. According to Jamie Shea, deputy assistant secretary general for emerging security challenges Read More …

CategoriesNews February 2017TagsCyber Domain, Intergovernmental, NATO

Security researchers announce “first practical” SHA-1 collision attack

Posted onFebruary 23, 2017November 16, 2020

Security researchers at the CWI institute in Amsterdam working with a team from Google Research say they have found a faster way to compromise the SHA-1 hash algorithm — announcing what they describe as “the first practical technique for generating Read More …

CategoriesNews February 2017TagsMalware, Netherlands, Research and Development

Post navigation

← Older posts

LATEST ARTICLES


A BEGINNER’S ROADMAP: HOW TO START YOUR AI SOC AGENT IMPLEMENTATION
By Kirsten Doyle
Cyber Security Review online – November 2025


THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER
Cyber Security Review online – July 2025


HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES
Cyber Security Review online – June 2025


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023

A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2026 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – January 2026
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise