Please turn on your JavaScript for this page to function normally.
Combating attacks with collaborative threat intelligence

Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …

Bruce Schneier on power and security

In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …

Week in review: Car hacking, Opera breach, and Carberp source code leaked

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Snowden on the run, leaks continue unabated Documents he shared with …

FDA shut down 1,677 illegal pharmacy websites

The U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action this week against more than 9,600 websites that …

Bruce Schneier joins EFF board of directors

The Electronic Frontier Foundation (EFF) announced the newest member of its Board of Directors: security expert Bruce Schneier. Schneier is widely acclaimed for his criticism …

Most Internet users have fallen victim to malware

The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …

Abuse of mobile app permissions

McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …

Explore, analyze and visualize data in Hadoop

Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …

Lord Sebastian Coe to keynote RSA Conference Europe 2013

RSA Conference announced Olympic champion, politician and former chair of the 2012 Summer Olympic & Paralympic Games, Lord Sebastian Coe to its lineup of keynote speakers …

Citadel Trojan automatically localizes fraud content

Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …

Attitudes towards data protection and encryption in the cloud

An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …

Can DDoS attackers turn mitigation devices against you?

SYN reflection attacks are one of the more sophisticated DDoS attack methods and typically require some skill to execute. However, they have recently grown in popularity as …

Don't miss

Cybersecurity news