Please turn on your JavaScript for this page to function normally.
European flag
Europe’s digital competitiveness depends on free data flow

The European Commission today tabled a package of measures to allow consumers and companies to buy and sell products and services online more easily and confidently across the …

WhatsApp
WhatsApp Gold doesn’t exist, it’s a scam that spreads malware

WhatsApp users are once again targeted by malware peddlers, via messages that offer WhatsApp Gold, supposedly an enhanced version of the popular messaging app previously used …

Who’s tracking you online, and how?

Armed with a tool that mimics a consumer browser but is actually bent on discovering all the ways websites are tracking visitors, Princeton University researchers have …

EU
Industry reactions to the EU General Data Protection Regulation

As of today, businesses have just two years to become compliant to the EU General Data Protection Regulation (GDPR) or risk major fines. Businesses will need to take adequate …

arrow
Reputation damage and brand integrity: Top reasons for protecting data

Vormetric announced the results of the European Edition of the 2016 Vormetric Data Threat Report. It focuses on responses from IT security leaders in European organisations, …

petya ransomware
Consumers have no idea what ransomware is

A new study reveals almost half (43%) of connected consumers today do not know what ransomware is, despite the recent aggressive spread of this type of cyber threat. In …

KeySweeper
FBI warns about keyloggers disguised as USB device chargers

A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The …

DMA Locker 4.0
DMA Locker ransomware ready for mass distribution

According to Malwarebytes’ researcher Hasherezade, we’re in for a lot of pain once the new and improved DMA Locker ransomware starts doing the rounds. Its first …

Bug
WPAD name collision bug opens door for MitM attackers

A vulnerability in Web Proxy Auto-Discovery (WPAD), a protocol used to ensure all systems in an organization utilize the same web proxy configuration, can be exploited to …

Tips for evolving your office’s security culture

Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …

bomb
Cybercriminals add DDoS component to ransomware payloads

Instead of just encrypting data files on a workstation (plus any network drive it can find) and locking the machine, a new variant of the Cerber ransomware is now adding a …

business
CIOs are hindered by massive tech skills shortage

More CIOs report directly to the CEO (34 percent) than at any time in the past decade, rising 10 percent over last year, according to the 2016 Harvey Nash/KPMG CIO Survey. …

Don't miss

Cybersecurity news