Please turn on your JavaScript for this page to function normally.
26 vulnerabilities found in parental monitoring application

A new Citizen Lab report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by …

The average budget required to recover from a security breach

The average budget required to recover from a security breach is $551,000 USD for enterprises, and $38,000 for small and medium businesses according to Kaspersky Lab.Based on …

Why improving cyber resilience is key

75 percent of U.S. organizations are not prepared to respond to cyberattacks, leaving them more vulnerable than ever against increasing intensity and volume of security …

Cyber risk still poorly communicated to C-suite executives

Cyber risk continues to be poorly communicated to C-suite executives, according to Auriga Consulting. The monopolisation of the risk management function by IT and security …

Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles:(IN)SECURE Magazine issue 47 released(IN)SECURE Magazine is a free digital …

Data security for the borderless enterprise

With the advent of cloud computing, social media and mobility, data is moving and proliferating at pace across borders, platforms and applications, very rarely staying within …

Information security: A key issue in the 2016 U.S. presidential campaign?

As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 …

State-sponsored cyberattacks linked to Russian intelligence gathering

F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …

Top cloud security issue? Lack of visibility

Lack of visibility into cloud deployments and associated provider security practices and controls is a source of major dissatisfaction amongst IT professionals, according to …

Big Data investments on the rise

Investment in big data continues to increase in 2015, but not as rapidly as in previous years. More than three-quarters of companies are investing or planning to invest in big …

80% increase of malware on Windows devices

“Alcatel-Lucent estimates that 80 percent of malware infections detected on mobile networks during the first half of 2015 have been traced to Windows-based computers. …

Malware takes screenshots of the infected players virtual poker hand

“Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of …

Don't miss

Cybersecurity news