Please turn on your JavaScript for this page to function normally.
Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

Transforming security processes to manage cyber risks

RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by …

Firefox 26 blocks Java plugins by default

Mozilla released Firefox 26 which includes five critical, three high, three moderate, and three low security updates. All Java plug-ins are defaulted to ‘click to …

Smarter cyber crime forces industry to change

Sophos released its latest Security Threat Report which outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their …

Positive and negative cyber threat developments in 2013

The EU’s cyber security Agency ENISA has issued its annual Threat Landscape 2013 report, where over 200 publicly available reports and articles have been analyzed. The …

Microsoft fixes 24 vulnerabilities

This Patch Tuesday features a solid 11 advisories affecting 6 different product types. All supported versions of Windows, Office, SharePoint, Exchange, Lync and a mixed bag of …

US phone carriers and wireless surveillance of Americans

As part of his ongoing investigation into wireless surveillance of Americans by law enforcement, US Senator Edward J. Markey released responses from eight major wireless …

Visualizing the year’s top cyber attacks

OpenDNS announced findings by its research organization into the most significant cyber attacks of 2013. Red October, Kelihos, Syrian Electronic Army DNS Hijack, Syria …

Inadequate electronic disposal protocols can lead to security leaks

American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …

Using firewall rules to migrate business applications to a private cloud

An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …

The iCloud keychain and iOS 7 data protection

When Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to …

Popular holiday-themed phishing attacks

The holidays are a busy time for everyone-¦ especially for hackers trying to phish your employees. Phishing is most effective when it exploits human emotions—fear, greed, …

Don't miss

Cybersecurity news