Please turn on your JavaScript for this page to function normally.
Biometric open protocol standard for safer authentication established

While biometrics are becoming a ubiquitous component of securing consumer data on mobile and other digital devices, there is no industry standard in place to protect that data …

ENISA issues report on how to act after power cuts

EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …

Senior managers are the worst information security offenders

As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …

What drives salary hikes for IT professionals?

The biggest salary increases for IT professionals are for roles that demand specific experience in big data analytics; ecommerce and mobile; and IT security. Salaries for all …

Top priorities for organisations to counter digital criminality

Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …

What are the most effective means for achieving IT ops excellence?

Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …

Triggering deep vulnerabilities using symbolic execution

Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …

Palo Alto Networks acquires Morta Security

Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …

Stealing money from ATMs with malware

This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …

The futility of all vendor predictions

As the New Year starts, many people look forward to what it will bring, and for many this involves looking at upcoming budgets and deciding on what to spend the money …

Microsoft releases BYOD best practices for enterprise workers

Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …

New Linksys 802.11AC WRT router allows open source customization

Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available …

Don't miss

Cybersecurity news