Energy security pros: More competent, or just naive?
Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …
How to survive a compliance audit
Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …
Expedia users targeted by phisher who gained access to their info
An unknown number of Expedia customers have been getting emails from the company, warning them about fraudulent emails or SMSes they might receive or might have already …
Nigerian scammers are stealing millions from businesses
When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …
Samsung disables Windows Update, undermines the security of your devices
Another example of how vendors sometimes choose to improve usability to the detriment of user security has been recently discovered by security researcher and Microsoft MVP …
Hackers are spending a huge amount of resources targeting financial services
Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous …
Businesses know about POS security risks, but are they investing wisely?
The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …
Three simple ways to prevent a data breach
With methods of cybercrime rapidly evolving, the number of headline-making data breaches continues to grow. Unfortunately, it has become clear that even advanced security …
Why a Dyre infection leads to more than just stolen banking credentials
“The Dyre/Dyreza information-stealer has without a doubt filled the vacuum generated by the 2014 and 2015 law enforcement takedowns of botnet infrastructure of several …
The downfall of a major cybercrime ring exploiting banking Trojans
“A joint investigation team (JIT) consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has …
Deadly Windows, Reader font bugs can lead to full system compromise
“Even in 2015 – the era of high-quality mitigations and security mechanisms – one good bug still suffices for a complete system compromise,” Mateusz …
WikiLeaks publishes reports showing NSA spied on French presidents
WikiLeaks has published “Espionnage Élysée”, a set of intelligence reports and documents that show that the US NSA has, between 2006 and 2012, intercepted the …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days