Please turn on your JavaScript for this page to function normally.
Most organizations unafraid of phishing

ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …

ENISA issues recommendations for securing data using cryptography

ENISA, the European Union’s “cyber security” Agency, launched a report recommending that all authorities should better promote cryptographic measure to …

Twitter abuse trends and stats

When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular. Fraudsters are cashing in on this in a …

CoverMe: Private texting, sharing and secure phone calls app

CoverMe, a secure texting, document sharing and phone call app, launched today after a beta period. Features include: Make free secure phone calls Send self-destructing …

Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware

Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …

Tips for protecting your personal and business data

As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …

Security misconceptions among small businesses

More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …

Retail sector slow in adopting new PCI standards

Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …

Network IDS reduces “white noise” for more focus on critical vulns

RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …

Spike in suspicious traffic and TOR usage, says threat report

Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …

Solving network security complexity with automation

Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …

The threat within: How SMEs can protect themselves from light-fingered staff

It hasn’t been an easy time for small businesses. Where once cybercriminals shunned SMEs in favour of larger corporates, the threat landscape has changed drastically in …

Don't miss

Cybersecurity news