Please turn on your JavaScript for this page to function normally.
The impact of new EU security legislation

Based on a survey of organizations from the UK, France and Germany, FireEye found that many organizations in Europe are unprepared for and challenged by cost and complexity of …

Employees would sell passwords for $150

SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …

Video: Bruce Schneier talks to Edward Snowden

As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …

What makes phishing emails so successful?

According to the results of a study performed by researchers from the University at Buffalo, “information-rich” emails that alter the recipients’ cognitive …

VPN services blocked by China’s Great Firewall

A number of popular VPN services are the latest target of China’s Great Firewall, including Astrill, StrongVPN and Golden Frog’s VyprVPN. Virtual Private Networks …

How GitHub is redefining software development

The security industry is slowly realizing what the developer community knew for years – collaboration is the key to and likely the future of innovation. Even if …

Police ransomware scam drives UK teen to suicide

For most people, a ransomware infection is not a huge tragedy: they pay the bogus fine (or not), and ultimately get their computer back either because the criminals unlock it …

Adobe updates Flash Player again, plugs 0-day exploited by Angler

Adobe made good on its promise to make available by this week a fix for the recently discovered critical zero-day Flash Player vulnerability (CVE-2015-0311) preyed on by the …

How the Internet of Things impacts enterprise security

A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study …

Open source software for quantum information

NIST has partnered with the private sector to develop the next-generation open source control software for quantum information systems. NIST is a world leader in quantum …

Week in review: HealthCare.gov leaks user data, Angler kit exploits Flash 0-day, researchers recreate NSA’s spying tools on the cheap

Here’s an overview of some of last week’s most interesting news, interviews and articles: Has the time come to give up penetration testing? The more miles of …

Google discloses three OS X 0-days

In the past few days, Google has released information about and proof-of-concept exploit code for three separate zero-day vulnerabilities affecting Apple’s OS X …

Don't miss

Cybersecurity news