Please turn on your JavaScript for this page to function normally.
Top security trend predictions for 2014

AppRiver released its list of the top IT security trend predictions for 2014. They predict organizations will see the following in 2014: State-sponsored attacks and cyber …

What do people want to hide on their smartphone?

More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …

How cyber squatters and phishers target antivirus vendors

Illegal online activities such as phishing and typosquatting are growing at an alarming rate. To understand the issue in detail High-Tech Bridge analyzed 946 domains that may …

Young professionals exposing workplaces to cyber attack

Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organizations across the country exposed to attack and …

Energy-efficient bcrypt cracking

Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …

Security is the biggest obstacle for moving data to Office 365

CipherPoint revealed the findings of its first State of Collaboration Security Report highlighting security issues with collaboration platforms such as Microsoft SharePoint, …

RAT-wielding attacker compromises poker player’s laptop

The laptop of a high-profile Finnish poker player has been found to contain spying malware after the device was stolen from and then returned to his room in a 5-star hotel in …

Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

Transforming security processes to manage cyber risks

RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by …

Firefox 26 blocks Java plugins by default

Mozilla released Firefox 26 which includes five critical, three high, three moderate, and three low security updates. All Java plug-ins are defaulted to ‘click to …

Smarter cyber crime forces industry to change

Sophos released its latest Security Threat Report which outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their …

Positive and negative cyber threat developments in 2013

The EU’s cyber security Agency ENISA has issued its annual Threat Landscape 2013 report, where over 200 publicly available reports and articles have been analyzed. The …

Don't miss

Cybersecurity news