Please turn on your JavaScript for this page to function normally.
bridge
Are you prepared for future information management requirements?

While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …

Google Chrome
Google Chrome update includes 15 security fixes

Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …

skull
Russian ransomware boss earns $90,000 per year

Despite too many users not even being aware of the existence of the ransomware threat, there is no doubt that it’s currently one of the most popular ways for cyber …

KeePass
KeePass update check MitM flaw can lead to malicious downloads

Open source password manager KeePass sports a MitM vulnerability that could allow attackers to trick users into downloading malware disguised as a software update, security …

FBI
FBI warns about email extortion attempts following data breaches

FBI’s Internet Crime Complaint Center has issued a public service announcement warning users about email extortion attempts related to recent high-profile data thefts. …

industry
Cyber risks for utilities, networks, and smart factories escalate

Three utilities companies in the Ukraine, the Israel National Electricity Authority and most recently a German nuclear power plant have suffered cyber attacks in recent …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

Bug
Bug poachers target businesses, demand money for bug info

Businesses are being hit with an extortion attempt based on attackers penetrating their network or websites and stealing corporate or user data. The attackers don’t say …

Windows
Windows zero-day exploit offered for sale on underground market

Someone is selling an exploit for a Windows zero-day on an underground market for Russian-speaking cyber criminals, and the current price is set at $90,000. Trustwave …

hard drive
Mobile workforce exposes businesses to security vulnerabilities

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …

Tor browser
Tor Browser 6.0 released

The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …

sharing
Identity fears are holding back the sharing economy

Businesses operating in the sharing economy are being held back by consumer fears over trust in the identity of the other party in the transaction, according to a new report …

Don't miss

Cybersecurity news