Please turn on your JavaScript for this page to function normally.
Exposing the organized crime of tomorrow

Europol identified a series of key driving factors that will impact the future landscape of serious and organized crime in Europe. A decline of traditional hierarchical …

(IN)SECURE Magazine issue 45 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 45 has been released today. Table of contents: How …

A threat assessment of 7 million iOS and Android apps

Android malware is growing more pervasive, and iOS devices are also increasingly at risk. FireEye analyzed seven million mobile apps on both Android and iOS platforms from …

New versions of Tails and Tor Browser fix numerous security issues

Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Several …

The shift to secure apps in the enterprise

As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …

Mobile security market to reach $34.8 billion by 2020

BYOD is adopted by most SMBs and large organizations, a major reason for the adoption of mobile security software. Smartphones are majorly adopted in Asia Pacific region and …

Week in review: Komodia SSL-busting code found in other software, critical Samba flaw, and black hole routing

Here’s an overview of some of last week’s most interesting news and articles: Is the Internet hiding a crime wave? The U.S. crime rate continues to fall, according …

Medical identity theft affected two million victims in 2014

The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013. In the five …

Critical vulnerabilities affecting SAP business critical apps

Onapsis released five security advisories detailing vulnerabilities in SAP BusinessObjects and SAP HANA enterprise software. Included in the security advisories are three high …

Aggressive adware in Google Play apps

Bitdefender has discovered 10 Google Play apps that have been packed full of aggressive adware. These either subscribe users to premium-rate numbers using scareware messages …

Security framework for governments deploying the cloud

ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …

Freeware tool helps monitor privileged accounts

Netwrix Effective Permissions Reporting Tool is a freeware solution designed to monitor privileged accounts by reporting on effective permissions in Active Directory and file …

Don't miss

Cybersecurity news