Please turn on your JavaScript for this page to function normally.
How the threat landscape will change by 2020

McAfee Labs’ five year look ahead attempts to predict how the types of threat actors will change, how attackers’ behaviors and targets will change, and how the industry …

6.4 billion connected things will be in use in 2016

Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …

Key developments on the cyber threat landscape in 2016

Reflecting the informed opinions of 33 of Intel Security’s thought leaders, a new report examines current trends in cybercrime and makes predictions about what the future may …

Most companies don’t believe their information security meets their organization’s needs

More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …

Exposing Rocket Kitten cyber-espionage group operations and targets

Check Point identified specific details and analyzed cyber-espionage activity conducted by the group Rocket Kitten, with possible ties to the Iranian Revolutionary Guard …

Information security and privacy are crucial for EU growth

The EU has to establish cyber trust among citizens and industry to create a competitive EU based ICT sector, further strengthening the EU position, and at the same time …

Stolen or lost devices and the risks of remote working

44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …

Cox Communications to pay $595,000 for data breach

The Federal Communications Commission’s Enforcement Bureau has entered into a $595,000 settlement with Cox Communications to resolve an investigation into whether the company …

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare

When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare

When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …

The transformative technology security nightmare

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …

Guide to application whitelisting

The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining …

Don't miss

Cybersecurity news