Please turn on your JavaScript for this page to function normally.
Search
Rise of cyber attacks against the public sector

The use of information and communication technologies in the public sector, specifically online government services, is a key factor for being targeted by cybercriminals. …

hard drive
Basic file deletion increases exposure to security risks

The use of improper data removal methods and the poor enforcement of data retention policies have created the perfect storm for confidential, oftentimes sensitive data to be …

Eye
Iris scanning: A secure ID trend for smartphones?

The release of the Samsung Galaxy Note 7 sparked something positive – iris scanning. ABI Research forecasts global shipments of smartphones equipped with iris scanners …

Qualys
Qualys expands cloud-based offering for security consultants

Qualys unveiled two new packages in its Qualys Consultant suite for independent consultants, auditors and security firms. With these new packages, this suite now offers …

(IN)SECURE Magazine 51
(IN)SECURE Magazine issue 51 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 51 has been released today. Table of contents …

Google Allo
Google’s smart search for security

Google made waves this week with the launch of the much-hyped messaging app Allo. The app boasts some impressive features, including embedding Google Assistant into your …

skull
How ransomware is impacting companies in six major industries

BitSight analyzed the security ratings of nearly 20,000 companies to identify common forms of ransomware and to determine which industries (amongst Finance, Healthcare, …

speed
Organizations sacrificing security for the speed of business

Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, …

danger
Surge in polymorphic attacks and malicious Android apps

Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number …

Bluetooth
Fresh Bluetooth Developer Toolkit line tackles IoT security, interoperability

The Bluetooth Special Interest Group (SIG) released several updates to its developer toolkit line-up, which enables developers to build smarter when creating things like …

Car
US gets federal guidelines for safe deployment of self-driving cars

The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …

Trust
Should you trust your security software?

The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools