Google relaxes its rigid 90-day bug disclosure period
Google has announced that its 90-day vulnerability disclosure period will, from now on, be little longer if the situation warrants it. Earlier this year the company was …
1 billion data records compromised in data breaches
More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …
Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com compromise
Here’s an overview of some of last week’s most interesting news, interviews and articles: Which kind of security professional are you? Since I became a part of the …
Scammers pushing fake AdwCleaner in active scareware campaign
An active scareware campaign pushing a fake version of the popular freeware spyware removal tool AdwCleaner is targeting Windows users and is trying to get them to fork over …
How to enable two-step verification for iMessages and FaceTime
After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …
16 million mobile devices infected by malware
Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …
The limits of prevention-centric security programs
In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …
Phishing attacks increasingly target financial data
28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …
IT security training is a top priority for CIOs
CIOs are taking a multipronged approach to protecting sensitive company information, and the majority are currently taking or planning to take steps in the next 12 months to …
VirusTotal sets up huge AV whitelist to minimize false positives
One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …
Attackers can bypass Windows’ protections by changing a single bit
Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single …
Increase in enterprise cloud adoption and data risk
Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards