Please turn on your JavaScript for this page to function normally.
Code analysis and app security testing simplified

Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker’s attacks to pinpoint …

ISACA launches cybersecurity skills and certification program

One in five IT security professionals say their enterprises have been the target of an advanced persistent threat (APT) yet 62 percent of organizations have not increased …

Six infosec tips I learned from Game of Thrones

In Westeros—the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers—even the youngest ones have to learn basic self-defense …

Biggest EU cyber security exercise taking place today

Today European countries kick off the Cyber Europe 2014 (CE2014), a sophisticated cyber exercise, involving more than 600 security actors across Europe. More than 200 …

Week in review: OpenBSD team forks OpenSSL, tech giants to fund open source projects, VPN users endangered by Heartbleed

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Supposedly patched router backdoor was simply hidden When …

Infosec problems create stress for IT departments

A new IT Admin Stress Survey from GFI Software revealed that 68% of IT staff are actively considering leaving their current role due to job-related stress, despite apparent …

Working to accomplish compliance and security

Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …

How cybercriminals profit from money laundering through gambling sites

A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30% over the …

NetSupport vulnerabilty allows information leakage

NetSupport is an application that allows corporations to remotely manage and connect to PCs and servers from a central location, to provide desktop support. I wrote a script …

Hands on fun at HacKid 2014

Last weekend, families and tech industry leaders descended on The Tech Museum of innovation in San Jose, California, for HacKid 2014. We had a great turnout for the event …

Researchers spot SMS Trojan active in the US

For the first time ever, Kaspersky Lab researchers have detected an active SMS Trojan in the United States. The malware in question is an SMS-sending Android Trojan dubbed …

DrDoS attacks to reach 800 Gbps in 2015

While the network time protocol (NTP) DrDoS threats that became prevalent in early 2014 have been contained, new distributed reflected denial of service threats will lead to …

Don't miss

Cybersecurity news