Please turn on your JavaScript for this page to function normally.
DDoS Downtime Calculator
DDoS downtime calculator based on real-world information

Are you wondering how you can assess the risks associated with a DDoS attack? Incapsula’s free DDoS Downtime Calculator offers case-specific information adjusted to the …

Gold
Man hacked, blackmailed gold bullion trading firm

25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are …

emergency
US 911 emergency system can be crippled by a mobile botnet

What would it take for attackers to significantly disrupt the 911 emergency system across the US? According to researchers from Ben-Gurion Univerisity of the Negev’s …

skull
Five ways to respond to the ransomware threat

The ransomware threat has taken a sharp upturn this year. In fact, a recent industry study found that nearly half of all U.S. businesses have experienced at least one …

abstract
Moving toward an intelligent hybrid security model

Cyber attacks aren’t slowing down – in fact, 76 percent of organizations have experienced a breach within the last two years. Enterprises of all sizes, across every industry, …

MySQL
MySQL 0-day could lead to total system compromise

Researcher Dawid Golunski has discovered multiple severe vulnerabilities affecting the popular open source database MySQL and its forks (e.g. MariaDB, Percona). One of these …

Danger
Macro-based malware evolves to bypass traditional defenses

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …

credit cards secure
PCI Council wants more robust security controls for payment devices

The PCI Council has updated its payment device standard to enable stronger protections for cardholder data, which includes the PIN and the cardholder data (on magnetic stripe …

IoT
Organization must modify the network access policy to address IoT devices

By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT …

Nexus
Consumers harassed by 30 million spam calls every day

Consumers are giving up twice as much sensitive data over the previous year, according to First Orion. Consumers are accosted by over 30 million spam calls to their mobile …

cables
End-to-end network segmentation essential for security, yet few deploy

As point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network …

keyboard
Week in review: Stealing login credentials, secure mobile communications explained

Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: Rambler.ru hack: Passwords of nearly 100 million users exposed A …

Don't miss

Cybersecurity news