Please turn on your JavaScript for this page to function normally.
gift
This year’s most hackable holiday gifts

Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

Skycure
Riskiest shopping malls for mobile devices

As the biggest shopping weekend of the year in the US approaches, Skycure is advising shoppers to beware of mobile threats while browsing in both physical and online stores. …

Businessman juggling
Business strategy and innovation framework for the industrial IoT

The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …

lock
The new age of quantum computing

Quantum encryption is the holy grail of truly secure communications. If and when quantum computing becomes a widespread reality, many public-key algorithms will become …

skull
While consumers remain complacent, hackers refine their skills

A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while …

match fire
Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers …

travel
Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

lock
How to prepare your company for cybersecurity threats

When the FBI announced the arrest of a Russian hacker in October, it was notable – but maybe not for the reason you’d expect. Yevgeniy N., who was picked up in Prague, is …

checklist
A checklist for people who understand cyber security

By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …

cloud
Navigating a way through the cloud

Private cloud is a compelling proposition for many businesses. With the help of server virtualisation, you can take your own infrastructure; make it ‘cloud-like’ and because …

The Basics of Cyber Safety
Review: The Basics of Cyber Safety

About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …

Black Friday
Securing Black Friday sales: Is your business ready?

Black Friday is the day following Thanksgiving Day in the US, well-known for a variety of promotional sales. These are dependent on Internet connections working, servers …

Don't miss

Cybersecurity news