Please turn on your JavaScript for this page to function normally.
Software-Defined Perimeter enables application-specific access control

Back in the early 1990s enterprises migrated away from proprietary protocols such as DECnet, SNA, and Novell IPX to common standards such as IP. The motivation was the open …

Most consumers believe cloud-based apps can be hacked

Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …

Nearly 2% of all smartphones are compromised or high risk

By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …

Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays

Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …

10 tips to avoid viruses on Halloween

As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …

Second teenager arrested in connection with TalkTalk hack

Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …

Real-world roadblocks to implementing CISA

The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …

China is the top target for DDoS reflection attacks

China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …

Online Trust Alliance releases new Internet of Things Trust Framework

The Online Trust Alliance (OTA) updated the IoT Trust Framework, a comprehensive global initiative that provides guidance for device manufacturers and developers to enhance …

CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom

Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to …

Most are unaware of the seriousness of medical data theft

Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

Don't miss

Cybersecurity news