Please turn on your JavaScript for this page to function normally.
How public Wi-Fi puts unprotected users at risk

76% of American smartphone and tablet users are at risk of privacy loss and identity theft via public Wi-Fi networks. The risk of using public Wi-Fi without a protected …

Kill Chain 3.0: Update the cyber kill chain for better defense

If you’re in infosec, you’ve surely heard of the kill chain – a defense model designed to help mitigate more advanced network attacks. The kill chain …

Unsurprisingly, adults don’t read terms and conditions of mobile apps

Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …

Security now one of the top risks for business leaders worldwide

Cybersecurity has come to the forefront of risk oversight for board members and C-suite executives, according to results of a survey of business executives by Protiviti and …

Are smart homes security smart?

A new ENISA study aims to identify both the security risks and challenges as well as the countermeasures required for emerging technologies in smart homes, providing a …

Which kind of security professional are you?

Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …

Week in review: Anthem breach, critical IE 11 bug can be used for phishing attacks

Here’s an overview of some of last week’s most interesting news and articles: Overcoming the daily challenges of a security team The institutionalization of …

How can organizations guard against hackers in 2015?

Advanced persistent threats, malware sent via attachments, direct targeting of specific users through spear phishing techniques, vulnerabilities exploited to silently deliver …

Investigating online dating fraud

The one thing that online dating scammers have in common is that their preferred target demographic is vulnerable and trusting people with a limited social circle or support …

Analysis of 2014 Microsoft patch trend data

Tripwire announced an analysis of Microsoft patch data from 2014. “The 2014 data clearly shows that Microsoft is packing in more CVEs per bulletin in 2014,” said …

Reactions to the extensive Anthem data breach

Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …

IT professional, hack thyself

To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …

Don't miss

Cybersecurity news