Please turn on your JavaScript for this page to function normally.
user
Cybercriminals filtering out victims by location

There’s a growing trend among cybercriminals to target and even filter out specific countries when designing ransomware, according to SophosLabs. To lure more victims …

person
Third party risk on the rise, risk mitigation still not a priority

Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

justice sentence gavel law court
US FISC approved all surveillance requests in 2015

The US Foreign Surveillance Intelligence Court (FISC) has approved every electronic surveillance request for foreign intelligence purposes it has received in 2015. As it turns …

terrorist
Europol to get new powers to disrupt terrorists’ online presence

The EU police agency Europol is expected to gain new powers that will help it fight terrorism and cybercrime, thanks to new governance rules endorsed by Civil Liberties …

Europe
US companies need to gear up for new EU data privacy regulations

Thousands of American companies that do business in Europe directly or online with European customers will need to start reckoning with new EU data privacy regulations that …

lights
Week in review: Top 10 web hacking techniques, exploit kit targets Android devices

Here’s an overview of some of last week’s most interesting news, reviews and articles: US Supreme Court approves expansion of FBI hacking powers The US Supreme …

keyboard
US Supreme Court approves expansion of FBI hacking powers

The US Supreme Court has approved on Thursday several changes to the federal rules around search warrants, one of which would allow US federal law enforcement agents to …

Android
Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

prison cell jail
Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular …

ISIS
Pro-ISIS hackers: Tactics, methodology and tools

While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously …

user
1 in 10 people have posed as someone else online

Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …

The challenges of controlling IT complexity

IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, …

Don't miss

Cybersecurity news