Please turn on your JavaScript for this page to function normally.
Penetration testing: Accurate or abused?

According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …

Best practices to help prevent online data breaches

The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …

Most top 500 Android mobile apps have security and privacy risks

After testing the top 500 Android applications, MetaIntell identified that approximately 460 of those 500 Android applications (available in apps stores such as Amazon, CNET, …

Top 10 DDoS attack trends

Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …

ENISA: Industrial Control Systems require coordinated capability testing

EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …

Most SMB employees in fear of identity theft in the workplace

The smaller business workplace has transformed into a mobile-enabled, agile, and satisfying environment, but one where the workforce is acutely aware and worried about the …

Motivation and techniques of world’s most sophisticated cyber attackers

CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …

Millions stolen via bluetooth-enabled skimming devices

Thirteen individuals have been indicted by the Manhattan District Attorney for stealing victims’ banking information with skimming devices at gas stations throughout the …

Free trial for cloud-based encryption and secure key management on AWS

SafeNet announced a thirty-day free trial of its ProtectV virtual encryption solutions and Virtual KeySecure via AWS Marketplace on Amazon Web Services (AWS). Financial …

Most non-IT employees don’t “get” company IT security policies

DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …

Cisco introduces Cybersecurity Specialist certification

To meet the increasing challenges of securing enterprise networks evolving in size, scope and complexity, Cisco announced a major revision of the CCNP Security Certification, …

Companies must improve incident response plans

Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …

Don't miss

Cybersecurity news