Please turn on your JavaScript for this page to function normally.
professional
BEC scams: What you need to know

Ransomware attacks hitting businesses and institutions might be the latest trend, but they are just one of the threats these organizations have to protect themselves against. …

eye
Hypervisor wiretap feature can leak data from the cloud

Bitdefender has discovered that encrypted communications can be decrypted in real-time using a technique that has virtually zero footprint and is invisible to anyone except …

email
Will your cyber insurance pay for email attacks?

If you’re relying on cyber insurance, check if your policies are up-to-date in covering new social engineering email attacks that are leaving firms at risk for taking …

face
Do employers give enough security training?

More than half of UK office workers say their employers have provided no cyber security awareness training, according to ISACA’s 2016 Cyber Security Perceptions study of more …

Google Chrome
Bug in Chrome’s PDF reader allows arbitrary code execution

Vulnerabilities in software often arise from faulty implementations of elements developed by other code writers. Take for example CVE-2016-1681, the heap-based buffer overflow …

password
32m Twitter login credentials stolen from users

Leaked Source has added 32,888,300 records of Twitter users to its repository of leaked data. The source of the batch is a user who goes by the alias …

CipherCloud
CipherCloud unveils first GDPR-ready cloud security solution

CipherCloud announced the availability of a cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR). Their Cloud …

bug
Bug bounty report card: Industry diversification and growth

With a global rise in cyberattacks and a critical deficit of security talent to combat adversaries, bug bounty programs congruently grew in both volume and scope in the last …

cloud
Perception of cloud security within enterprises is improving

The perception of cloud security within enterprises is improving dramatically year-over year as cloud applications mature, according to Bitglass. One of the most significant …

Fire
A third of organizations experienced a data breach in the past 12 months

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …

Keyboard
Digital businesses will suffer for inability to manage risk

As organizations transition to digital business, a lack of directly owned infrastructure and services outside of IT’s control will need to be addressed by cybersecurity. …

Infosecurity Europe 2016
Photos: Infosecurity Europe 2016

Taking place in London right now is Infosecurity Europe 2016. Europe’s largest information security event has more companies exhibiting than ever before, and a …

Don't miss

Cybersecurity news