Please turn on your JavaScript for this page to function normally.
Is the Internet hiding a crime wave?

The U.S. crime rate continues to fall, according to the latest FBI’s release based on Uniform Crime Reporting from police departments, but researchers say those numbers, …

Lack of trust is affecting how consumers use the Internet

68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea …

Concerns around endpoint security

The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …

Week in review: Gemalto SIM heist, Lenovo’s Superfish blunder, cyber spies compromising disk firmware

Here’s an overview of some of last week’s most interesting news and articles: Google relaxes its rigid 90-day bug disclosure period Google has announced that its …

Gemalto announces investigation of massive SIM heist

Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …

Over 250,000 home routers sport same SSH keys, warns researcher

With a simple search, John Matherly, the creator of Shodan, has discovered with it more than 250,000 routers that share the same SSH key, meaning they also share the same …

Google’s new Cloud Security Scanner detects common security bugs

Here’s some good news for Google App Engine developers: Google has released a new application security scanner that’s especially fitting to test new app builds for …

How to wipe Superfish adware and offending cert from your Lenovo laptop

After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …

Don’t wait until you’re attacked to take cybersecurity seriously

CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …

How cybercriminals hack our brains

Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …

Cyber readiness across government and critical infrastructure industries

While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …

AT&T: Pay more if you don’t want to share data for personalized ads

If you are a customer of AT&T’s GigaPower fiber-optic Internet access service and you don’t want to see personalized ads based on your browsing history, …

Don't miss

Cybersecurity news