15,435 vulnerabilities across 3,870 applications were recorded in 2014
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …
Mobile apps are not being tested for insecure behavior
Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …
One in three top Alexa websites is risky
Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running …
Organizations have little control over privileged access
Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …
Premera breach: Are HIPAA standards too low?
Here’s an interesting twist regarding the Premera data breach revealed last week: the company has been deemed compliant with the Health Insurance Portability and …

Finalists announced for Innovation Sandbox at RSA Conference 2015
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
Old Adobe Flex SDK bug still threatens users of many high-profile sites
An old vulnerability affecting old releases of the Adobe Flex SDK compiler can be exploited to compromise user data of visitors to many popular sites, including three of most …
The average DDoS attack tripled in volume
The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the …
Full, cracked version of NanoCore RAT leaked, onslaught of infection attempts expected
NanoCore, a lesser-known remote access Trojan (RAT), has recently been spotted being delivered to employees of energy companies in Asia and the Middle East via spear-phishing …
Twitch forces users to reset password in wake of breach
Twitch, the popular Amazon-owned game streaming service, has apparently suffered a breach that might have resulted in the compromise of users’ personal information and …
UK consumers committed to mobile privacy
Spurred by high-profile data breaches, Edward Snowden’s revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have …
Hack air-gapped computers using heat
Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)