Please turn on your JavaScript for this page to function normally.
Securing networks in the Internet of Things era

We all know that the Internet of Things (IoT) is coming, and it’s going to change everything. Its sheer scale alone is almost mind-boggling: Gartner reckons that the …

Why you’re not as secure as you think you are

There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time …

Worldwide infosec spending to grow in 2014

Worldwide spending on information security will reach $71.1 billion in 2014, an increase of 7.9 percent over 2013, with the data loss prevention segment recording the fastest …

51 UPS stores hit with PoS malware

UPS Stores, a subsidiary of UPS, has discovered malware on systems at 51 locations in 24 states (about 1%) of 4,470 franchised center locations throughout the United States. …

What can we learn from the top 10 biggest data breaches?

You can’t blink these days without hearing about yet another data breach. While some may be suffering from “breach fatigue” and becoming jaded, we argue that …

NIST vetting guide helps in testing mobile apps

While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …

Crooks trying out new tactics to spread fake AV

Infection numbers of well-established fake AV families have reached the lowest level in years, and Microsoft researchers believe the drop is the result of the antimalware …

Machete cyber espionage campaign targeting Latin America

Kaspersky Lab discovered a new cyber-espionage campaign code-named Machete. This campaign has been targeting high profile victims, including government, military, law …

Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Infographic: How secure is Bitcoin?

The security of Bitcoin transactions is one of the main drawbacks of the digital currency. The infographic below takes a look at what you need to know to stay vigilant. Click …

51% of consumers share passwords

Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …

Reactions to the massive breach at Community Health Systems

Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …

Don't miss

Cybersecurity news