Please turn on your JavaScript for this page to function normally.
Dangerous spam targets Brits with fake Easter offers

Cybercriminals are hiding dangerous goodies among the Easter eggs and chocolate bunnies that Brits are hoping for this Easter. A large amount of religious scams have also been …

Security pros and government failing to collaborate

Infosecurity Europe has today released a new report that provides a snapshot of the industry landscape and the challenges it is currently facing. Having surveyed 1,149 …

SharePoint users are breaching security policies

A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas, has found that at least 36% of SharePoint users are breaching …

Microsoft releases Threat Modeling Tool 2014

The Microsoft Threat Modeling Tool 2014 is the latest version of the free Security Development Lifecycle Threat Modeling Tool that was previously released back in 2011. …

Security pros actively hiding negative facts from executives

A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …

ModSecurity 2.8.0 released

ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. It can also monitor the HTTP traffic in real time in order to …

Heartbleed threatens mobile users

As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the OpenSSL Heartbleed bug. In the days after the …

The security of the most popular programming languages

A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …

Heartbleed should jumpstart important security changes

With impacts on an estimated 60-70% of websites, Heartbleed is easily the security vulnerability with the highest degree of potential impact ever. There’s lots of good …

Half of IT pros make undocumented changes to IT systems

57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …

Businesses take little action to mitigate the insider threat

While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …

Growing concerns over data privacy

Almost nine in ten (88%) US consumers are at least “a little” concerned about the privacy of their personal data, according to GfK. One in three consumers also …

Don't miss

Cybersecurity news