Volvo to launch a car without a physical key
Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …
Deep and Dark Web: Complexity and escalating cybercriminal activity
Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …
Coalition aims to educate policymakers on cybersecurity
A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …
PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …
Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …
IRS warns of 400 percent surge in tax-related phishing emails
The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing
The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …
IT spending to slow down in 2016
Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …
Ransomware offers customer support via chat
PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …
Email security still an afterthought
Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …
Application downtime costing enterprises $16 million each year
Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …
Featured news
Resources
Don't miss
- Public mobile networks are being weaponized for combat drone operations
- Attackers keep finding the same gaps in security programs
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware
- Scammers exploit trust in Atlassian Jira to target organizations