Google offers five grants to women in security to attend HITB2014AMS
As part of Google’s ongoing commitment to encourage women to excel in computing and technology, Google is offering five grants to women in security to attend the Hack In …
Top ten points in the fight against cybercrime
At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …
Police ransomware: A multimillion business
The European Cybercrime Centre at Europol published its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the …
Personal info of 800,000 Orange customers compromised
Global telecom giant Orange has sent out alerts to nearly 800,000 (some 3 percent) of its French customers warning them that their personal information was compromised in a …
Hackers sue German government for helping NSA spy on its citizens
The Chaos Computer Club (CCC), Europe’s largest hacker association, and the International League for Human Rights (ILMR) are suing the German government for allegedly …
10,000+ UK systems affected by ICEPOL Trojan ransomware
At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …
Improving trust in web services
The EU’s cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations …
EU Commission joins forces with companies for 250,000 training courses and new digital jobs
European Commission President José Manuel Barroso and Vice President Neelie Kroes brought CEOs from across the global economy together at the World Economic Forum in Davos …
ENISA: Industrial Control Systems require coordinated capability testing
EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
When can you trust web services to handle your data?
A new report by the EU’s cyber security agency ENISA analyses the conditions under which online security and privacy seals help users to evaluate the trustworthiness of …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption