Please turn on your JavaScript for this page to function normally.
How people perceive online privacy

A new study by the National Cyber Security Alliance shows that Americans care deeply about their privacy. While a great knowledge gap exists about how information is collected …

What IT workplace issues keep CIOs awake at night?

What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …

Canada’s spy agency monitors file downloads around the world

After NSA whistleblower Edward Snowden shared the documents he exfiltrated from the agency with select journalists, the revelations that stemmed from them have mostly focused …

Email scammers stole $215M from businesses in 14 months

The Business E-mail Compromise scam is alive and well, and expected to rise both when it comes to the number of victims and the total money loss sustained by them. According …

Guidance to improve risk management and IoT

As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance …

How much can a DDoS attack cost your organization?

A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the …

D-Link routers vulnerable to DNS hijacking

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, …

Swiss users inundated with malware-laden spam

Swiss users are being heavily targeted by a number of spam campaigns delivering the Tiny Banker (TinBa or Busy) e-banking Trojan. Starting with Tuesday, the spammy emails seem …

Market share of antivirus vendors and products

A new report from OPSWAT determined the market share for the top five antivirus vendors with RTP enabled. It includes: Avast – 21.4% Microsoft – 19.4% AVG – …

Reactions to the serious vulnerability found in Glibc

The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …

Critical BlackPhone bug allows attackers to spy on users

BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that …

New OS X Yosemite version fixes critical security issues, including Thunderstrike

Apple has released the latest version of OS X Yosemite (v10.10.2) and the first security update (2015-001) for this year, and among the problems fixed is one affecting the CPU …

Don't miss

Cybersecurity news