Please turn on your JavaScript for this page to function normally.
How old are today’s networks?

The percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years, signaling that the global financial crisis of …

Business risk: Tales from the TrueCrypt

The recent incidents with the Heartbleed OpenSSL vulnerability, along with the strange turn of events involving TrueCrypt shine a light on a big issue for security …

Data breaches in 2013 exposed 14% of all debit cards

Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to …

Invasive Selfmite SMS worm uncovered

AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …

1.3M personal records exposed in Montana data breach

1.3 million people will be notified that hackers gained entry to a State of Montana’s Department of Public Health and Human Services (DPHHS) computer server, state …

Banking fraud campaign steals 500k euros in a week

The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the …

Companies are afraid of the cloud

Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 …

(IN)SECURE Magazine issue 42 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 42 has been released today. Table of contents: Six …

Top 10 technologies for information security in 2014

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …

Are CISOs too confident?

CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority …

Symantec addresses global workforce gap in cybersecurity

Symantec launched a first-of-its-kind program, the Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career …

Mobile security and incident readiness

AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that …

Don't miss

Cybersecurity news