Please turn on your JavaScript for this page to function normally.
(IN)SECURE Magazine 52
(IN)SECURE Magazine issue 52 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 52 has been released today. Table of contents …

danger
Next year, attacks will differentiate to penetrate new vulnerable surfaces

The upcoming year will include an increased breadth and depth of attacks, with malicious threat actors differentiating their tactics to capitalize on the changing technology …

PoS
PoS attacks: Undetected vulnerabilities lay in wait

Attivo Networks issued a report detailing severe vulnerabilities in the nation’s POS systems that could lead to large breaches during the Holiday shopping period and on into …

bomb
323,000 pieces of malware detected daily

According to Kaspersky Lab, the number of new malware files detected by its products in 2016 increased to 323,000 per day. This is an increase of 13,000 from the amount in …

phishing
Over 400,000 phishing sites have been observed each month during 2016

84 percent of phishing sites observed in 2016 existed for less than 24 hours, with an average life cycle of under 15 hours. The data collected by Webroot shows that …

IoT
The early IoT gets the worm

Five days after the start of World War I, Sir Edward Grey, British Foreign Secretary, remarked to a close friend, “The lights are going out all over Europe, we shall not see …

watch
Top 4 global security threats businesses will face in 2017

The Information Security Forum (ISF) has announced their outlook for the top four global security threats that businesses will face in 2017. “The pace and scale of …

mobile device
Corporate data left unprotected in the wild

A new survey conducted by YouGov has highlighted the risks to corporate data from poor encryption, and employee use of unauthorised and inadequately protected devices. The …

cloud
Governments are behind on data encryption in the public cloud

A HyTrust survey of 59 government and military organizations found that nearly 20 percent of those respondents do not implement data security or encryption solutions in the …

Expedia
Former Expedia IT support worker spied on company executives

A computer support technician formerly employed at Expedia offices in San Francisco pleaded guilty to securities fraud. Jonathan Ly, 28, admitted he used his position in tech …

point
Top 6 breach response best practices for 2017

Cybercrime costs are expected to rise to $2 trillion by 2018, according to Juniper Research, in large part because the increase in cyber threats is resulting in a surge in …

access
Remote access options for unidirectionally protected networks

In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about remote access options for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools