Please turn on your JavaScript for this page to function normally.
Most users don’t trust app developers with their data

Research by ISACA shows that, of 1,000 employed consumers surveyed in the UK, only 4% named the makers of their mobile phone apps as the entity they most trust with their …

LastPass 3.0 comes with new design and features

Popular password manager LastPass has reached version 3.0. The new release features an updated, clean design across the LastPass browser addons, the iOS and Android mobile …

What happens when a scammer tries to scam a security researcher?

I just got off the phone with a very nice gentleman from the “service center for the Windows operating system computers.” During the call, he informed me that they …

The dangers of weakening cybersecurity to facilitate surveillance

In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …

Triumfant detects and stops in-memory malware attacks

Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …

New healthcare security and privacy certification from (ISC)2

(ISC)2 has launched a new certification, the HealthCare Information Security and Privacy Practitioner (HCISPPSM), the first foundational global standard for assessing both …

How to address the main concerns with ISO 27001 implementation

Recently I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those …

Most organizations unafraid of phishing

ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …

ENISA issues recommendations for securing data using cryptography

ENISA, the European Union’s “cyber security” Agency, launched a report recommending that all authorities should better promote cryptographic measure to …

Twitter abuse trends and stats

When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular. Fraudsters are cashing in on this in a …

CoverMe: Private texting, sharing and secure phone calls app

CoverMe, a secure texting, document sharing and phone call app, launched today after a beta period. Features include: Make free secure phone calls Send self-destructing …

Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware

Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …

Don't miss

Cybersecurity news