Please turn on your JavaScript for this page to function normally.
NIST vetting guide helps in testing mobile apps

While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …

Crooks trying out new tactics to spread fake AV

Infection numbers of well-established fake AV families have reached the lowest level in years, and Microsoft researchers believe the drop is the result of the antimalware …

Machete cyber espionage campaign targeting Latin America

Kaspersky Lab discovered a new cyber-espionage campaign code-named Machete. This campaign has been targeting high profile victims, including government, military, law …

Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Infographic: How secure is Bitcoin?

The security of Bitcoin transactions is one of the main drawbacks of the digital currency. The infographic below takes a look at what you need to know to stay vigilant. Click …

51% of consumers share passwords

Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …

Reactions to the massive breach at Community Health Systems

Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …

Successful strategies to avoid frequent password changes

1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …

Infographic: Major security skills shortages

Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …

Research unveils improved method to let computers know you are human

CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …

ReversingLabs extracts malicious files from network traffic

ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …

Whitepaper: Social networking and security risks

The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …

Don't miss

Cybersecurity news