Please turn on your JavaScript for this page to function normally.
DDoS attacks continue to fall in size and frequency

The newest up-and-coming countries of origin for DDoS attacks will be Vietnam, India and Indonesia in 2015, according to Black Lotus. While these countries don’t have …

One billion attacks were blocked during the third quarter

Over a billion malicious attacks were detected and blocked during the third quarter, according to Kaspersky Lab. One third of Web attacks were carried out using malicious Web …

Whitepaper: CISOs secret weapon for reducing enterprise risk

Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …

Open Whisper Systems helps WhatsApp achieve end-to-end encryption

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …

Cisco open sources Big Data security analytics framework

“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …

Critical factors in preventing data breaches

McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …

Michaels and Staples breaches carried out by same attackers?

The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …

One-in-four have been victims of identity theft

Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …

Trojanized Android firmware found on inexpensive handhelds

It’s unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it’s no guarantee that it’s malware-free. Researchers from …

Top 5 fraud risk areas in the workplace

Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely …

TRUSTe deceived consumers through its privacy seal program

TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …

ReadyNAS OS offers 5 levels of data protection

NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …

Don't miss

Cybersecurity news