Please turn on your JavaScript for this page to function normally.
New technique makes phishing sites easier to create, more difficult to spot

Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form. …

Linksys SOHO router owners urged to patch multiple vulnerabilities

Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of …

Which messaging technologies are actually secure?

The Electronic Frontier Foundation has evaluated 39 chat clients, text messaging apps, email apps, and technologies for voice and video calls, and found that only six of them …

Using security, cloud and Big Data to drive success

Dell surveyed more than 2,000 global organizations and found that security is the biggest concern in adopting cloud, mobility and Big Data. While 97 percent of organizations …

Backoff PoS malware becomes stealthier, more difficult to analyze

The Backoff Point-of-Sale RAM scraper malware has become even more difficult to detect and analyze, warns Fortinet researcher Hong Kei Chan. Even after the US DHS and US CERT …

Mobile security breaches impacted 68% of organizations

Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …

Security issues in collaboration platforms

CipherPoint revealed the results of its second annual survey on security issues in collaboration platforms such as Microsoft SharePoint, Office 365, and Google Apps. …

Free webinar: The basics of risk assessment and treatment according to ISO 27001

Register for this webinar to learn: The purpose of risk management Risk identification – assets, threats and vulnerabilities Risk analysis – how to assess impact …

Google open sources nogotofail, a network traffic security testing tool

In their quest to make users, the Internet, and digital devices in general more secure, a number of big Internet companies have recently announced a new collaboration that …

Extracting data from air-gapped computers via mobile phones

A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …

Nearly 50% have been a victim of a data breach

RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security. Surveying more than 1,000 consumers …

227,747 new malware samples are created daily

The growth of malware appears unstoppable. In total, some 20 million new strains were created worldwide in the third quarter of the year, at a rate of 227,747 new samples …

Don't miss

Cybersecurity news