Please turn on your JavaScript for this page to function normally.
Exploit kit activity up 75 percent

The creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in the third quarter of 2015 from the same period in 2014, according to …

Guidelines for smart city technology adoption

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, released guidelines jointly developed by Securing Smart …

Will 2016 mark the end of the Advanced Persistent Threat?

Advanced Persistent Threats (APTs) as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to detect and trace back to the …

Unsafe password policies leave shoppers vulnerable

Dashlane examined password security policies on 25 of the most popular online retailers. They tested 22 criteria, and each criterion was given a +/- point value that enabled a …

Point of Sale malware gaining momentum as holiday shopping season approaches

Point of sale (POS) systems – what consumers often call the checkout system – are often the weak link in the chain and the choice of malware. They should be isolated …

BadBarcode: Poisoned barcodes can be used to take over systems

Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …

Five hacks that will affect your life in 2016

Cyber attackers have an abundance of opportunities to steal or modify data and disrupt business services. And their playground grows bigger and more diverse every day as the …

How businesses interpret and use threat intelligence

A new IDC study of 300 large UK companies found that: 96% of UK firms already use threat intelligence products and services; all of those surveyed intend to do so within the …

Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL

Here’s an overview of some of last week’s most interesting news and articles:Ivan Ristic and SSL Labs: How one man changed the way we understand SSL“When I …

The appliance straightjacket and its effect on security

We have a love/hate relationship with our IT appliances. These technology workhorses impress us with their modern, industrial designs, bright colors, and slick branding. When …

Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case

After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …

Data breaches and bots are driving cybercrime surge

From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter. This …

Don't miss

Cybersecurity news