Please turn on your JavaScript for this page to function normally.
Operation takes down crime network affecting European electronic payments

Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in The Hague, …

In wake of breach, eBay has to deal with multiple web vulnerabilities

As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …

Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms

Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …

China will start screening IT products

The Chinese government has announced that it will start vetting IT products and services that are to be used on networks and systems important to national security and public …

Anti-surveillance mask foils facial recognition systems

The unnerving ubiquity of security cameras in public places and the fact that an increasing number of them are connected to facial recognition systems has spurred …

Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

Facebook introduces privacy check up tool

Facebook continues on its course to give users more privacy by making “Friends” the default sharing option for first time posters, and by introducing a privacy …

Netwrix extends auditing visibility into SharePoint changes

SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …

What is the key to IT program management?

The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …

Trust in the U.S. cloud on the decline

Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …

POS facial recognition can prevent fraud

Lately, the news has been filled with stories of identify fraud. This, paired with the increase in mobile payments, furthers the need for companies to have access to enhanced …

Mobile app for single sign-on access to thousands of applications

Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …

Don't miss

Cybersecurity news