Please turn on your JavaScript for this page to function normally.
Cloud-based solutions that protect against zero day attacks

BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. …

Endpoint Protector gets integration with cloud storage apps

At Infosecurity Europe 2015, CoSoSys announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data …

Employee credentials of half of European top 500 firms exposed online

Cyber attacks and data breaches very often start with phishing or spear-phishing. Access to good credentials is key – whether it’s for straight emailing or direct …

Hackers stole personal info of over a million of Japanese pensioners

Personal information of some 1.25 million of Japan’s pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension …

How businesses can stem the flow of leaky data

The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, …

Hacker leaks sensitive info of millions of Adult FriendFinder users

Information of over 3.5 million users of dating site Adult FriendFinder has been stolen and leaked online, and is being used by spammers, scammers and phishers, a Channel 4 …

Company compiles massive marketing database by scraping data dumps

SalesMaple, a recently founded data analytics startup headed by PwnedList founder Steve Thomas, has made available a free database of some 30 million business contacts, which …

Sensitive customer data leaked following mSpy data breach

mSpy, a company that sells “customized and user-friendly mobile and computer monitoring solutions,” has apparently suffered a data breach.They still haven’t …

WinMagic
SecureDoc Cloud removes security concerns related to cloud file sharing

WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …

What happens to data after a breach?

Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …

A billion data records leaked in 2014

2014 was the year when “designer vulnerabilities” emerged, when breaches and security incidents were being announced so fast that we struggled to keep up, when old …

Darkleaks: An online black market for selling secrets

Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …

Don't miss

Cybersecurity news