Please turn on your JavaScript for this page to function normally.
Phishing campaigns target diverse webmail users at once

Every now and then, phishers mount campaigns that simultaneously target users of different online services. This time the lures are different: access to a document that is …

Average enterprise generates 10,000 security events daily

Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …

Arrests in international voice-phishing case

Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …

NIST guidelines help developers build security in from the start

A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …

The evolution of an Iranian hacker group

Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …

Despite hearing about Heartbleed, 47% have not changed their passwords

In light of the recent Heartbleed bug, LifeLock announced survey results that reveal consumers’ behavior and attitudes surrounding the security flaw. The recent survey, …

Toshiba launches HDDs for surveillance applications

Toshiba launched the MD03ACA-V series, high-capacity hard disk drives for surveillance applications. Toshiba’s purpose-built line of 3.5-inch HDDs are available in …

Microsoft releases eight security updates

There is a lot going on in the updates from Microsoft this month, including some very interesting and long time coming changes. Also, it’s the highest volume of …

NSA allegedly puts backdoors on American-made network devices

Glenn Greenwald’s new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura …

Building a more secure and agile Internet

The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) awarded $15 million to support three, multi-institutional …

“Your Photos Are being Used” phishing scam targeting Facebook users

Another day, another Facebook phishing scam. This one comes in the form of a warning sent by a friend: “OMG YOUR PHOTOS ARE BEING USED ON THIS SITE.” The victim, …

Making the web a safe place to visit

The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …

Don't miss

Cybersecurity news