Please turn on your JavaScript for this page to function normally.
IoT attacks and evasion techniques will characterize threats in 2016

As in years past, the Internet of Things and cloud play heavily in the predictions but new malicious tactics and strategies will create unique challenges for vendors and …

ModPOS: The most sophisticated POS malware to date

Elements of ModPOS date back as far as early 2012. It targeted US retailers in late 2013 and throughout 2014, and is expected to continue to do so in the future. According to …

Five ransomware safety tips for online retailers

Cybercriminals have developed a destructive new form of ransomware that targets online retailers. They scan websites for common vulnerabilities and use them to install malware …

Remote working on the rise despite security concerns

Remote working is increasing in popularity as 96 percent of surveyed organisations now permit remote/mobile working, with 98 percent stating that it is advantageous to their …

The current wave of data protection regulations and how it will affect the infosec industry

In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into …

75% of companies experienced a fraud incident in the past year

Three quarters of companies (75%) have fallen victim to a fraud incident in the past year, a rise of 14 percentage points in just three years, according to Kroll.The findings …

Two arrested for helping malware developers evade AV software

Two suspects have been arrested on suspicion of operating a website offering services to help criminals overcome and avoid anti malware software, following a joint …

Network protocol analyzer Wireshark 2.0 released

Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …

Most consumers concerned about becoming victims of online crime

Globally, 62 percent of consumers believe it’s more likely their credit card information will be stolen online compared to only 38 percent who think it’s more likely they will …

Man stole special agent’s identity, executed a complex identity theft scheme

Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …

Perspectives on the state of Internet security

In today’s digital world terms like hacker and worm are widely recognized. But in November 1988 remote breaching was unheard of, at least until the Morris worm was …

The top 7 improvements in Nmap 7

Nmap 7 is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.The top 7 …

Don't miss

Cybersecurity news