Please turn on your JavaScript for this page to function normally.
SanDisk unveils new wireless flash drive

SanDisk unveiled a new wireless mobile flash drive, the SanDisk Connect Wireless Stick, which enables sharing, transferring and accessing data between mobile devices and …

Coalition for Responsible Cybersecurity fights proposed export control regulations

A broad cross-section of industry announced the formation of the Coalition for Responsible Cybersecurity. The purpose of the Coalition is to prevent the Commerce Department …

Employees embrace BYOD, but still worry about privacy

The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …

Unsharing in the sharing economy

It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …

TeslaCrypt 2.0 makes it impossible to decrypt affected files

“Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting …

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach

After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …

The difficult task of meeting compliance needs

Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …

3 ways to stop insider threats in your organization

No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …

Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools

Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …

Why is ERP security so difficult?

ERP (Enterprise Resource Planning) security has been all over the news lately. From high profile breaches, like the recent U.S. Office of Personnel Management breach, to …

Naked pictures or financial info? Users would rather thieves stole the former

Every day it seems information security is ruling the headlines, Americans are (perhaps understandably) feeling insecure about the security of their financial information. In …

Don't miss

Cybersecurity news