Please turn on your JavaScript for this page to function normally.
Facebook
Beware of Facebook “Security System Page” scams

Facebook users have lately become targets of phishers who are not satisfied with stealing the users’ login information, but they want their security questions and …

Wi-Fi Zone
1 in 3 home routers will be used as public Wi-Fi hotspots by 2017

Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …

light
Data protection and breach readiness guide

The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …

entrepreneur
Europe’s cyber security accelerator program helps entrepreneurs

A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …

pound
How much could a cyber attack cost the HMRC?

HMRC could face compensation claims of over £13 billion if it were to lose people’s personal and financial data as a result of a cyber attack, according to a new study by …

Abstract
A possible future for IoT security

There are many problems with Internet of Things devices, and security is one of the biggest ones. To serve as an example of this important issue, two researchers from …

euro
Belgian bank Crelan loses €70 million to BEC scammers

Belgian bank Crelan has become a victim of fraudsters. According to a statement (in Dutch) published last week, the bank has lost over 70 million euros (around $75,8 million). …

payment data security
The dismal state of payment data security

With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their …

euro
Top drivers of investment in forensic data analytics

Cyber breaches and insider threats, which include malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks according to executives and are …

Phishing email leads to data breach at University of Virginia

Personally identifiable and financial information of some 1,400 University of Virginia employees has been compromised by attackers in a breach that dates back to early …

linux tux
Versatile Linux backdoor acts as downloader, spyware

Another Linux Trojan has been discovered by researchers, and this one is pretty versatile: it opens a backdoor into the infected device, can download and run additional …

Fortinet
SSH backdoor found in more Fortinet devices, exploit attempts spotted in the wild

In case you missed it, Fortinet announced last week that the recently discovered FortiOS SSH backdoor – or, as they call it, “a management authentication …

Don't miss

Cybersecurity news