Please turn on your JavaScript for this page to function normally.
Abstract
Anonymous networks 101: Into the heart of the Darknet

Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …

clock
Week in review: Dyre gang takedown, and the most popular hacking methods

Here’s an overview of some of last week’s most interesting news and articles: Know your enemy: The most popular hacking methods Outsiders want to become insiders …

Hands
Know your enemy: The most popular hacking methods

Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

NowSecure
A look into the current state of mobile security

A quarter of all mobile apps have at least one high risk security flaw, 35 percent of communications sent by mobile devices are unencrypted, and the average mobile device …

business
When it comes to cyber attack detection, IT pros are overconfident

A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to …

IoT
IoT security guidelines for providers, vendors, and network operators

The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …

Fire
Exposing the Adwind RAT: One of the biggest malware platforms in existence today

At the end of 2015, Kaspersky Lab researchers became aware of an unusual malware program that had been discovered during an attempted targeted attack against a bank in …

money
Government sector: largest revenue contributor for the global cyber security market

The cyber security market is predicted to reach close to USD 161 billion in revenue by 2020, according to Technavio. “During the forecast period, the market share of North …

money
What’s the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Connect
Network forensic analysis tool NetworkMiner 2.0 released

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

Most IT pros have seen potentially embarrassing information about their colleagues

More than three-quarters of IT professionals have seen and kept secret potentially embarrassing information about their colleagues, according to new research conducted by …

Broken glass
The return of Carbanak: Banks face new attacks

A year after Kaspersky Lab warned that cyber-criminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed …

Don't miss

Cybersecurity news