Gamers attacked 11.7 million times in 2013
Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …
Energy-efficient bcrypt cracking
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …
Inadequate electronic disposal protocols can lead to security leaks
American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …
Using firewall rules to migrate business applications to a private cloud
An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …
Popular holiday-themed phishing attacks
The holidays are a busy time for everyone-¦ especially for hackers trying to phish your employees. Phishing is most effective when it exploits human emotions—fear, greed, …
The DDoS debate: Multi-layered versus single solution
There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …
OS X hardening tips
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …
Unwrapping holiday gift card fraud
Spending on gift cards is expected to hit new highs this holiday season – the National Retail Federation predicts that gift card sales will reach almost $30 billion. …
Beware of online dangers lurking this Cyber Monday
Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …
Overcoming the data privacy obstacle to cloud based test and development
How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …
Cyber Monday security tips for businesses
Security experts at Neohapsis have put together the following tips to help keep businesses safe. 1. Use HTTPS – Remind employees to use HTTPS to make sure all data …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics