Please turn on your JavaScript for this page to function normally.
1 in 4 employees enable cloud attacks

While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …

D-Link’s failed patch for DIR-890L router adds a new hole

Prolific hacker Craig Heffner, who has a particular interest in hacking embedded devices, has recently documented the existence of a command injection bug in the firmware of …

Security analytics: The key for breach detection?

Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced …

IBM unveils cyber threat intelligence sharing platform

IBM is making its vast library of security intelligence data available via the IBM X-Force Exchange, a new cyber threat intelligence sharing platform powered by IBM Cloud. …

HSBC Finance Corporation confirms data breach

A breach notification letter sent to the New Hampshire Attorney General’s Office by the HSBC Finance Corporation has revealed that sensitive mortgage information of …

Cisco splats router bug that can lead to persistent DoS

Cisco has patched a vulnerability that affects Cisco ASR 9000 Series Aggregation Services Routers and can be exploited by a remote, unauthenticated attacker to effectively …

Dropbox launches bug bounty, will also pay for previously reported bugs

Dropbox is the latest company to officially announce a bug bounty program set up through the HackerOne platform. While the program has been up and running for several months …

TeslaCrypt ransomware pushed by several exploit kits

TeslaCrypt is one of the newest additions to the ransomware category of malware, and is being pushed out to users left and right. Aside from the usual assortment of file types …

Internet of Everything attack surface grows

The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …

What IT skills are in demand?

More than 11,000 IT and business professionals in North America responded to the eighth annual IT Skills and Salary Survey by Global Knowledge and Windows IT Pro. Key …

Perception and reality of perimeter security effectiveness

A widening gap is emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing …

New Java vulnerabilities remotely executable without login

It is extremely important that enterprises urgently patch their Java Runtime Environments (JREs) and (Java Development Kits) JDKs since 14 vulnerabilities addressed in this …

Don't miss

Cybersecurity news