What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …
Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …
UK: Cybercrime now bigger threat than traditional crime
The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …
Week in review: Mac malware boom, TP-LINK loses control of configuration domains
Here’s an overview of some of last week’s most interesting news, reviews and articles: TP-LINK loses control of two device configuration domains Security …
BMW ConnectedDrive flaws could be misused to tamper with car settings
Security researcher Benjamin Kunz Mejri has found two vulnerabilities in the BMW ConnectedDrive web portal/web application. About the vulnerabilities in BMW ConnectedDrive The …
Kovter malware masquerades as Firefox update
Click-ad-fraud Kovter malware, packaged as a legitimate Firefox browser update, is being delivered to unsuspecting victims via drive-by-download attacks. Kovter, which also …
DDoS extortion campaigns increasingly target businesses
80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network …
Keydnap malware opens backdoor, goes after passwords in OS X keychain
ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …
Growth prospects of the cloud-based information governance market
The global cloud-based information governance market will grow at a CAGR of more than 27% through 2020, according to Technavio. Cloud-based information governance involves the …
Avast to acquire AVG for $1.3 billion
Avast Software and AVG Technologies have entered into a purchase agreement in which Avast will offer to purchase all of the outstanding ordinary shares of AVG for $25.00 per …
Google fixes 108 bugs in July Android security update
Google has released an unusually hefty Android Security Bulletin for July. In fact, so many vulnerabilities have been fixed – 108 in all – that the patches come in …
StubHub fraud ringleader sentenced to state prison
Vadim Polyakov was sentenced to 4-to-12 years in state prison for coordinating an international cybercrime and money laundering scheme that involved the theft of personal …
Featured news
Resources
Don't miss
- Healthcare security is broken because its systems can’t talk to each other
- Wanna bet? Scammers are playing the odds better than you are
- Google adds Emerging Threats Center to speed detection and response
- UK’s new Cyber Security and Resilience Bill targets weak links in critical services
- Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)