Please turn on your JavaScript for this page to function normally.
Risk IT and services spending to reach $78.6 Billion in 2015

According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …

GPU-based malware is real, say developers of PoC rootkit and keylogger

“Two yet unfinished coding projects by a group of developers that call themselves Team Jellyfish have received unexpected attention due to an Ars Technica article …

Casino installs new POS equipment while investigating potential data breach

A few days after Las Vegas’ Hard Rock casino revealed that it has been hit by carders, another US casino has started an internal investigation aimed at finding out …

Millions of WordPress sites risk hijacking due to flaw in default theme

Guess what? Unless your site is hosted by one of 11 specific web hosts, it’s time to patch your WordPress installation again! Netsparker researchers have recently …

Researchers create searchable database of intelligence operators

The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights …

Workplace stress dramatically impacting IT professionals

High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …

Top cyber attack vectors for critical SAP systems

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …

Criminal attacks in healthcare are up 125% since 2010

The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks—exposing millions of patients and their medical records, according …

Lenovo makes new critical security mistakes

After the Superfish debacle earlier this year, Lenovo’s security practices have once again been found lacking as researchers have discovered several vulnerabilities in …

Year-old flaw in popular WordPress plugin still actively exploited

Sucuri Security researchers have discovered yet another malicious campaign redirecting users to sites hosting exploits. As per usual, the attackers are mostly leveraging …

Netflix open sources FIDO, its automated incident response tool

Netflix has open sourced FIDO (Fully Integrated Defense Operation), a system for automatically analyzing security events and responding to security incidents that the company …

As Uber account compromises continue, company says they weren’t breached

Transport service company Uber has had its fair share of problems through the years, but lately instances of hacked accounts and fraudulently booked trips seem to have …

Don't miss

Cybersecurity news