Please turn on your JavaScript for this page to function normally.
chess
Data breaches: Playing by a new set of rules?

Tell me, what’s your response when you hear that a company that was breached are now losing customers? I suppose it’s at this point the word reasonable makes an appearance. …

documents
Securing document flow: Exploring exposure and risk

There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …

HITB Amsterdam
Hack In The Box announces keynotes for 2017 Amsterdam event

Hack In The Box announced an exciting line-up for its annual security conference taking place in Amsterdam on April 13th and 14th. Groundbreaking security research covering …

laptop crime
U.S. charges Russian FSB officers for hacking Yahoo, millions email accounts

A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, …

blocks
Leaked: Personal info on 33+ million employees across the US

Personal and contact information on over 33 million employees of various US-based corporations and federal agencies like the Department of Defense has been leaked. The …

WhatsApp Telegram
Vulnerability in WhatsApp and Telegram allowed complete account takeover

Check Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, …

Microsoft logo
March Patch Tuesday closes record number of vulnerabilities

With no February Patch Tuesday, it was to be expected that Microsoft would fix a huge number of security issues in March. They didn’t disappoint: 139 unique CVEs have …

Laptop
The impact of highly targeted attacks on modern organizations

In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about the growing trend of targeted attacks, as well as strategies …

cybercrime
Online fraudsters’ preferred tools and techniques revealed

A new report by DataVisor Threat Labs has provided unprecedented insight into the behaviors and attack techniques of some of the world’s largest online crime rings, and …

ransomware
Organizations hit with Petya ransomware with a twist

Various organizations are being targeted by cyber crooks leveraging the infamous Petya ransomware. A modified Petya version inside a Trojan But victims will have a difficult …

Cyber espionage topping the list of largest security concerns

20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …

Tech
Mobile workers continually expose organizations to security risks

29 percent of organisations have already experienced either a data loss or breach as a direct result of mobile working, according to research conducted by Vanson Bourne. As …

Don't miss

Cybersecurity news