Please turn on your JavaScript for this page to function normally.
How trustworthy are the world’s leading websites?

The Online Trust Alliance (OTA) evaluated nearly 1,000 websites, grading them based on dozens of criteria in three categories: consumer protection, privacy and security.Their …

90% of companies benefit from Big Data

Enterprise Big Data strategies are delivering key benefits to organizations despite noted challenges in implementation, according to CA Technologies.Nine in 10 organizations …

LastPass breached, hashed master passwords compromised

LastPass, the company behind the popular password management service of the same name, has announced on Monday that they have suffered a breach, and has urged users to verify …

Trojan uses steganography to hide itself in image files

“The Dell SecureWorks CTU research team has recently analyzed a piece of malware that uses digital steganography to hide part of its malicious code. Stegoloader, as they …

Stolen Foxconn certs used to sign malware used in Kaspersky Lab attack

“After last week’s revelation that their corporate network has been hit by APT actors wielding a newer version of the infamous, Stuxnet-related Duqu attack …

Emojis instead of PIN codes as an alternative for forgetful users

For years now companies have been trying to come up with alternatives to passwords and passcodes that will be easier to remember (for users) and more difficult to guess or …

Rethinking security: Securing activities instead of computers

For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) …

Stronger data protection rules for Europe

More than 90% of Europeans are concerned about mobile apps collecting their data without their consent. Today, an important step was taken to finalize EU data protection rules …

OPM hack: Vast amounts of extremely sensitive data stolen

The extent of the breach suffered by the US Office of Personnel Management has apparently widened. Reports are coming in that the hackers have not only accessed Social …

Week in review: Windows 10 security, developing honeypots, IoT security holes

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Brain’s reaction to certain words could replace passwordsYou might not …

Malware attacks give criminals 1,425% return on investment

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2014. They gathered the data from 574 breach investigations the …

Microsoft flags Ask toolbar as unwanted and dangerous

From this month on, all versions of Ask.com’s infamous browser toolbar except the very last will be detected as unwanted software by Microsoft security products and …

Don't miss

Cybersecurity news