Please turn on your JavaScript for this page to function normally.
Compromised websites from a site owner’s perspective

Malicious actors are often able to compromise legitimate websites without the site owners’ knowledge: over 90% of respondents didn’t notice any strange activity, …

Careless management of crucial security instruments

A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is …

Log management deserves a company’s respect

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …

HITBSecConf2012: Revamped live hacking competition

What first began as a small gathering for computer security enthusiasts in 2002, Hack In The Box Security Conference (HITBSecConf) has since grown into a must attend event in …

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here’s an overview of some of last …

10.8 million Android devices infected with malware

From 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals, according to NQ Mobile. In 2011, newer and more …

Tips to minimize the risk of identity fraud

Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …

No skeleton key: Protecting your organization on the web

Weaknesses in the SSL protocol or the public certificate authority ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been …

Password amnesia and online identity

The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …

NAC system PacketFence 3.2.0 released

PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. This is a major release with new features, new hardware support, …

Application security intelligence combats mobile threats

Cenzic introduced a new application security intelligence service that secures mobile applications on all mobile platforms, via the cloud. The new solution scans and provides …

Identity fraud hits 11.6 million in the US

In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools