Please turn on your JavaScript for this page to function normally.
Worldwide IT spending to grow 2.1 percent in 2014

Worldwide IT spending is on pace to total $3.7 trillion in 2014, a 2.1 percent increase from last year, however, this grow rate is down from earlier projections of 3.2 percent …

Western energy companies hit by state-sponsored hackers

Symantec researchers have confirmed the findings of their colleagues at F-Secure, who have been monitoring the spreading of the Havex malware family, and have put them in a …

Microsoft disrupts malware networks and APT operations

Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …

Number and diversity of phishing targets continues to increase

The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …

163k individuals affected in Butler Uni data breach

Personal and financial information of some 163,000 students, alumni, faculty, staff, and past applicants of Indianapolis-based Butler University have been stolen following a …

DDoS attacks are becoming more effective

Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …

Google Drive update fixes data-leaking flaw

Google has fixed a security issue that made some of the files stored on Google Drive and shared with friends or colleagues via a direct link potentially reachable by …

Banking malware sniffs out data sent over HTTPS

Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking …

The impact of IoT on IT infrastructure

Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity …

State of the Internet: Trends impacting online business

Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic …

Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …

How does a rogue ad network function?

It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …

Don't miss

Cybersecurity news