Please turn on your JavaScript for this page to function normally.
Your email, your data, your control

In the U.S., we are willing to trade our privacy and security in exchange for convenience. Think about the last time you stored your password on a website, kept a credit card …

Top 5 social media security predictions for 2015

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …

Smart grid security certification in Europe

ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …

python
Python Forensics

Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …

Only 1% of consumers feel safe using mobile payments

Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., a new survey by One Poll and Dimensional Research revealed that more than 40 percent of …

Application Threat and Usage Report 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic …

Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

Top 5 malware attacks: 35 reused components

CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …

Protecting the underground electronic communications infrastructure

ENISA has released a new report on the Protection of Underground Electronic Communications Infrastructure. This report – targeted at Member States (MS), public …

TorrentLocker exposed: Investigation and analysis

ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …

How employees put your company at risk during the holidays

Most enterprises of any significant size have implemented security training programs, designed to teach employees how to avoid major security risks – phishing attacks …

76% of organizations have suffered a DNS attack

Seventy-six percent of organizations in the U.S. and U.K. have suffered a DNS attack, with 49 percent experiencing one in the past 12 months, according to Cloudmark. The most …

Don't miss

Cybersecurity news