Please turn on your JavaScript for this page to function normally.
Top six security threats for 2014

The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …

Shopping convenience overrides security concerns

Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …

Akamai to acquire Prolexic

Akamai and Prolexic have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise …

OS X hardening tips

OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …

Eyes on the cloud: Six predictions for 2014

As we head into 2014, people in the cloud virtualization industry begin to wonder exactly what to expect from the technology in the New Year. We’ve seen some interesting …

Week in review: Cyber Monday dangers, Twitter adds Forward Secrecy, and a Linux worm that targets the Internet of Things

Week in review: Here’s an overview of some of last week’s most interesting news, videos and articles: Innovations that will shape network security Responding to an …

Experts predict widespread attacks on online banking users

Kaspersky Lab has recorded several thousand attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in …

Unwrapping holiday gift card fraud

Spending on gift cards is expected to hit new highs this holiday season – the National Retail Federation predicts that gift card sales will reach almost $30 billion. …

Lessons learned from Anonymous and Operation Last Resort

Activists that have links to Anonymous were able to gain access to U.S. government computers through a software flaw on the outdated Adobe ColdFusion platform. This left many …

Browser scan unveils an abundance of critical vulnerabilities

Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …

Can we expect a cyberwar resurgence?

Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …

Verify your software for security bugs

Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …

Don't miss

Cybersecurity news