Please turn on your JavaScript for this page to function normally.
businessman
What differentiates a great CIO from simply a good one?

Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO). Young started his career as a software …

Europe
Definitive EU net neutrality guidelines released

The Body of European Regulators for Electronic Communications (BEREC) has published the final guidelines aimed at helping EU member states’ National Regulatory …

Chrome
Google Chrome impersonator Trojan doing rounds

If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with …

SimpleRisk
SimpleRisk: Enterprise risk management simplified

In this podcast recorded at Black Hat USA 2016, Josh Sokol, creator of SimpleRisk, talks about his risk management tool, which he presented at the Black Hat Arsenal. Written …

L0phtCrack
L0phtCrack 7 audits passwords up to 500 times faster

L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs. A 4-core …

web
Ubiquity and danger: The web scraping economy

Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing …

Linux servers hit with FairWare ransomware – or is it just a scam?

Users posting on Bleeping Computer’s forums have alerted the world to a new threat targeting Linux server admins: the FairWare ransomware. Whether the ransomware …

USB
USBee makes USB devices transmit data from air-gapped computers

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at …

doors
How to choose a perfect data control solution for your enterprise

Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In …

CodexGigas
CodexGigas: Malware profiling search engine

CodexGigas is a free malware profiling search engine powered by Deloitte Argentina, which allows malware analysts to explore malware internals and perform searches over a …

cloud hand
55% of apps are already in the cloud, security a priority

Executives are increasingly adopting a digital business model, with the cloud as the key enabler. However, security concerns and tepid execution complicate the ability of the …

analytics IT assets
Feds are using big data analytics for cybersecurity, but is it effective?

81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy …

Don't miss

Cybersecurity news