Please turn on your JavaScript for this page to function normally.
Next year, smart cities will use 1.6 billion connected things

Gartner estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39 percent from 2015.“Smart commercial buildings will be the …

Microsoft kills many critical flaws, some 0-days, un-trusts one wildcard cert

For this December Patch Tuesday, Microsoft has released twelve security bulletins, eight of which have been rated critical.Those refer to the cumulative security updates for …

Apple releases security updates for every major product

Apple has released security updates for the operating systems running on the company’s iPhones, computers, Apple TV and various versions of smartwatches, as well as …

Only 37% of SMBs think they’re equipped to manage IT security

Just 37% of IT decision makers surveyed in the US, the UK, and Australia believe their organisations are completely ready to manage IT security and protect against threats. …

Demand for new malicious programs reaches saturation point

According to Kaspersky Lab, the number of new malware files detected by its products in 2015 decreased to 310,000 a day, falling 15,000 from the 2014 number of 325,000. …

DDoS attacks increase 180% compared to a year ago

Akamai Technologies announced its Q3 2015 report, which provides analysis and insight into the global cloud security threat landscape.“Akamai has been seeing greater …

Top IoT concerns? Data volumes and network stress

The scaling out to many thousands of devices per organization represents a wealth of new opportunities, according to a report by Quocirca. However, the same security rigor and …

Retailers are unaware of sensitive data leaks

A significant amount of retailers assign the same login credentials to employees and do not know if employees have leaked sensitive data – in spite of the majority …

Flaws in industrial gas detectors exploitable by low-skilled attackers

Two industrial gas detector product lines manufactured by Honeywell sport two remotely exploitable vulnerabilities that can allow an attacker to retrieve the user’s …

Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers

Sijmen Ruwhof, a freelance IT security consultant and ethical hacker from Utrecht, recently stumbled across what turned out to be an example of how poor security practices of …

Exploring the North American cybercriminal underground

Unlike counterparts in other countries, the North American underground encourages cybercriminal activity amongst novices and seasoned pros alike, according to Trend Micro.“The …

Technology
Nemesis financial malware kit gains bootkit capabilities, extra stealth

A threat group that steals mostly payment card data from financial services organizations has added a bootkit utility to their malware toolkit. This new capability assures the …

Don't miss

Cybersecurity news