Please turn on your JavaScript for this page to function normally.
Exploring today’s top security concerns

Security related topics are often front and center in the 24-hour news cycle, but what concerns Americans the most? According to a new national survey from University of …

Security policy management in hybrid cloud environments

A new survey by AlgoSec found that 79 percent of organizations need better visibility in order to unify security policy management across their on-premise and public cloud …

The Crime-as-a-Service business model

A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …

Seagate Surveillance HDD features recovery services

Seagate released a dedicated surveillance HDD featuring Seagate Rescue services. Engineered specifically for surveillance and video analytics applications, the Surveillance …

CloudFlare offers free SSL encryption

Web performance and security company CloudFlare today launched Universal SSL, making Secure Socket Layer (SSL) encryption available to anyone at no cost. “Yesterday …

Bash Shellshock bug: More attacks, more patches

As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it …

PoS vendor confirms Jimmy John’s breach was their fault

Signature Systems, the PoS system vendor that has been named as the likely point of origin of the Jimmy John’s payment data breach, has confirmed that the attacker(s) …

WordPress vulnerability database

Back in 2012, the fine folks behind the BruCON conference announced that from the 2013 edition of their popular event, a special budget will be allocated for supporting …

Trust in the cloud is at an all-time low

Data security and trust in cloud-based services are a rapidly growing concern for IT decision makers within large organizations, according to a new global study from BT. While …

Week in review: Bash Shellshock bug, jQuery.com compromise, and a replacement for TrueCrypt

Here’s an overview of some of last week’s most interesting news and articles: Behavioral analysis and information security In this interview, Kevin Watkins, Chief …

Bash “Shellshock” bug: Who needs to worry?

As expected, attackers have begun exploiting the GNU Bash “Shellshock” remote code execution bug (CVE-2014-6271) to compromise systems and infect them with …

Malvertising attack techniques dissected

At Virus Bulletin 2014, Bromium presented a research report that highlights the severe risk of malicious ad networks infecting end users. This research provides a real-world …

Don't miss

Cybersecurity news