Please turn on your JavaScript for this page to function normally.
Internet of Things: Whose data is it, anyway?

Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate …

Why insider threats are succeeding

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or …

15,000 spam emails have hit the inboxes of Android users in recent days

“Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore …

Sniffing and tracking wearable tech and smartphones

Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …

Travel smart: Tips for staying secure on the road

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your …

Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …

Windows Live ID scam targets personal information

Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, …

Malware upsurge threatens millions of POS devices

Notable brands like Target, Neiman Marcus, PF Changs, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting …

Most organizations value threat intelligence sharing

94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …

Companies stay vulnerable to web attacks for far too long

While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …

The rise in false fraud alerts

68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …

Can you afford to wait 197 days to detect a threat?

Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …

Don't miss

Cybersecurity news