Please turn on your JavaScript for this page to function normally.
DEF CON contest to help track down illegal robocalls

The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …

Financial ransomware now targeting U.S. users

Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …

Service providers need different core competencies in a digital world

Organizations’ emerging transformation to digital business models is driving the need for greater IT agility to meet changing business strategies and requirements in a …

Analysis of 3000 vulnerabilities in SAP

According to official information from SAP portal, more than 3000 vulnerabilities have been closed by SAP. Here are 6 highlights from a research conducted by the ERPScan team …

Week in review: Replicating NSA’s gadgets using open source, World Cup-themed threats, and life after TrueCrypt

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Replicating NSA’s gadgets using open source In this …

Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

Microsoft says user content won’t be used for targeted advertising

Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …

One-third of cyber attacks take hours to detect

More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months. Despite increased resource …

The privacy attitudes of 15,000 consumers from 15 countries

Spanning 15 countries and 15,000 consumers, the the EMC Privacy Index reveals consumers hold viewpoints on privacy that vary widely by geography and the type of activity …

What’s the leading cause of data loss?

HDD crashes more than doubled in the last four years, prevailing as the most common cause of data loss according to customer data provided by Kroll Ontrack. When asked about …

Linksys launches Pro Series Wireless Access Point

Linksys announced the first Pro Series Wi-Fi access point with the launch of the Wireless-AC Dual Band Access Point (LAPAC1750PRO). The new Pro Series access point offers …

Fake, malicious World Cup-themed apps targeting Android users

The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions …

Don't miss

Cybersecurity news