Please turn on your JavaScript for this page to function normally.
A closer look into the piracy ecosystem

Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications.Arxan and …

Rise in DDoS reflection attacks using abandoned routing protocol

There’s been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai.RIPv1 is a …

Updated Point-to-Point Encryption standard now provides more flexibility

The Payment Card Industry Security Standards Council (PCI SSC) published an important update to one of its eight security standards, simplifying the development and use of …

Multi-link network encryptor with 100 Gbps encrypted bandwidth

Gemalto released its new SafeNet Multi-Link High Speed Encryptor (HSE) solution that provides the equivalent of 10 by 10 Gbps high-speed encryptors in one unit. With a total …

(IN)SECURE Magazine issue 46 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 46 has been released today.Table of contents: The …

Four essential tips that you can use to stay safe when you travel

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber …

Confidence in antivirus falls to all-time low

While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …

Worldwide IT spending to decline 5.5 percent in 2015

Worldwide IT spending is on pace to total $3.5 trillion in 2015, a 5.5 percent decline from 2014, according to the latest forecast by Gartner, Inc. Analysts attribute the …

Why vulnerability disclosure shouldn’t be a marketing tool

There have been many arguments within the security community on how researchers should disclose the existence of a security vulnerability. Some argue that full disclosure is …

NIST revises security publication on random number generation

In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for …

Security concerns continue to dog the cloud industry

Executives at major North American companies believe conventional network security solutions aren’t enough to protect their cloud computing environments, especially when it …

5 ways to stop the Internet of Things from becoming the Internet of Thieves

The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …

Don't miss

Cybersecurity news