Please turn on your JavaScript for this page to function normally.
Mitigations for Spike DDoS toolkit-powered attacks

Akamai Technologies released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts …

Training for CISSP and other (ISC)2 certifications

(ISC)2’s CISSP Live OnLine CBK Training Seminar gives you the same award-winning course content as the classroom-based seminars and the benefit of an (ISC)2 Authorised …

Emerging international data privacy challenges

According to a new survey from the Cloud Security Alliance there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. …

Companies becoming lax in managing BYOD risk

Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …

Board practices regarding IT oversight and cybersecurity

Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …

Top tips to protect systems against insider misuse

The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …

jQuery.com compromised to serve malware via drive-by download

jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, has been compromised and has been redirecting visitors to a website hosting …

Beware of Apple Wave microwave wireless charging hoax

Excited about the new Wave iPhone wireless charging technology and can’t wait to try it out? Please don’t – it’s a hoax. You risk damaging both your …

Minimizing privacy risks of location data collection

With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …

High-volume DDoS attacks on the rise

A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of …

Blackphone and Silent Circle announce bug bounty program

Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …

Mobile device security is sacrificed for workforce efficiency

While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …

Don't miss

Cybersecurity news