Please turn on your JavaScript for this page to function normally.
5 ways to stop the Internet of Things from becoming the Internet of Thieves

The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …

4 in 10 midsize businesses have experienced a data breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …

Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles:Penetration Testing With Raspberry PiRaspberry Pi is a small and …

Why a low-level threat can open the door for serious infections

“A device hi-jacked for the purpose of conducting click-fraud can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how …

How companies can regain consumer trust after a data breach

Americans have strong feelings about data breach notification, with 84 percent stating that the best way a company can regain their trust after a breach occurs is to notify …

Energy security pros: More competent, or just naive?

Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …

The cloud, FedRAMP and FISMA compliance

Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, …

How to survive a compliance audit

Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …

Nigerian scammers are stealing millions from businesses

When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …

Hackers are spending a huge amount of resources targeting financial services

Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous …

Businesses know about POS security risks, but are they investing wisely?

The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …

Three simple ways to prevent a data breach

With methods of cybercrime rapidly evolving, the number of headline-making data breaches continues to grow. Unfortunately, it has become clear that even advanced security …

Don't miss

Cybersecurity news