Please turn on your JavaScript for this page to function normally.
Insider threats 101: The threat within

Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of …

Payment gateway provider breached

New Jersey-based Charge Anywhere, whose electronic payment gateway solutions route payment transactions from merchants’ Point-of-Sale (PoS) systems to their payment …

Do senior executives understand their role in data security?

There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …

10 strategies to protect patient information

Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …

Security deficiencies that increase data breach risk

Many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches. Based on a global survey of …

Security trends you should NOT worry about in 2015, and five you should

Along with its latest predictions, which examine the likelihood of common network security prophecies next year, WatchGuard’s security research team also included five …

Browser vulnerabilities to become biggest endpoint challenge

A growing number of flaws in web browsers is viewed as the biggest endpoint security headache by today’s IT decision-makers, according to Malwarebytes. With the number …

Corporate data: Protected asset or a ticking time bomb?

Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they …

Cyber attacks now longer than ever

Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, 52% of respondents …

Microsoft released seven advisories, three are critical

December’s Patch Tuesday brings us seven advisories, three of which are listed as Critical. Depending on how you want to count it, we see a total of 24 or 25 CVEs …

Linux backdoor used by Turla APT attackers discovered, analyzed

Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …

Info of millions of AliExpress customers could have been harvested due to site flaw

A programming flaw in the code of popular online marketplace AliExpress, which connects small Chinese businesses with international buyers and has over 7.7 million registered …

Don't miss

Cybersecurity news