Please turn on your JavaScript for this page to function normally.
How-to guide to protecting yourself from electronic spying

The Electronic Frontier Foundation (EFF) launched its updated Surveillance Self-Defense report, a comprehensive how-to guide to protecting yourself from electronic spying for …

Ebola-themed emails deliver malware, exploit Sandworm vulnerability

US CERT has recently issued a warning about malware-delivery campaigns using users’ fear of the Ebola virus and its spreading as a bait. One of the most prolific …

100 million cloud file analysis reveals shadow data threat

Elastica conducted a security analysis of more than 100 million files being shared and stored in leading public-cloud applications. Research revealed that 20 percent of …

40% of enterprise employees use personal devices for work

Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …

Open source NAC solution PacketFence 4.5.0 released

PacketFence is a free and open source Network Access Control (NAC) solution. It can be used to effectively secure small to very large heterogeneous networks. Among the …

ISSA launches professional development framework

ISSA launched an industry-wide program to solve the global cybersecurity workforce gap. The ISSA Cybersecurity Career Lifecycle (CSCL) is a professional development framework …

INTERPOL World launches partners program

INTERPOL World has launched a Strategic Partners Program with private-sector security solutions providers to jointly create solutions to real-world security challenges faced …

Cyber skills shortage makes UK a soft target for hackers

A survey conducted by MWR InfoSecurity at 44Con 2014 has revealed that 75% of the information security professionals in attendance believed that a lack of cyber security …

Avast 2015 identifies vulnerable home routers

Avast Software launched Avast 2015, available in four consumer variations: Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security, and Avast Premier. All versions …

Think before you share that file

It’s hard to read through the news nowadays without stumbling upon some type of data breach or leak. Recently, Apple’s iCloud service has been in the limelight, …

Koler worm spreads via SMS, holds phones for ransom

A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …

60% of Android attacks use financial malware

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …

Don't miss

Cybersecurity news