Please turn on your JavaScript for this page to function normally.
Factors that influence breach costs

A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to the SANS Institute. A lot of it depends on their …

The automation and industrialization of cyber attacks

A new Imperva report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive …

Why governments need to take the lead in cybersecurity

Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …

Endpoint security lags in spite of vulnerabilities

Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …

Buhtrap gang distributes malware through Ammyy’s remote desktop software

ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …

Three indicted in largest theft of customer data from a U.S. financial institution in history

On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …

Long-term skills shortage drives tech salaries up

Four in 10 technologists changed jobs this year, according to the Harvey Nash Technology Survey. Respondents listed a good salary as their main motivator (77 percent) behind …

How the threat landscape will change by 2020

McAfee Labs’ five year look ahead attempts to predict how the types of threat actors will change, how attackers’ behaviors and targets will change, and how the industry …

6.4 billion connected things will be in use in 2016

Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …

Key developments on the cyber threat landscape in 2016

Reflecting the informed opinions of 33 of Intel Security’s thought leaders, a new report examines current trends in cybercrime and makes predictions about what the future may …

Most companies don’t believe their information security meets their organization’s needs

More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …

Exposing Rocket Kitten cyber-espionage group operations and targets

Check Point identified specific details and analyzed cyber-espionage activity conducted by the group Rocket Kitten, with possible ties to the Iranian Revolutionary Guard …

Don't miss

Cybersecurity news