Please turn on your JavaScript for this page to function normally.
How a fake antivirus attack works

Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …

Defending against drive-by downloads

In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …

Why governance and policy can strengthen compliance efforts

A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …

How to recover deleted or corrupted digital currency

The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …

Smartphone spying: How can users protect themselves?

Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …

Who should be responsible for protecting your online privacy?

Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …

DDoS attacks become smarter, faster and more severe

DDoS attacks will continue to be a serious issue in 2014 – as attackers become more agile and their tools become more sophisticated, according to Radware. Their report …

Improving trust in web services

The EU’s cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations …

Fixing the Internet of Things

Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …

Penetration testing: Accurate or abused?

According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …

Best practices to help prevent online data breaches

The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …

How to implement incident reporting in cloud computing

Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …

Don't miss

Cybersecurity news