Please turn on your JavaScript for this page to function normally.
Key security technologies can help cloud adoption

The majority of companies are delaying deployment of cloud applications due to security and compliance concerns. Among the companies that have started to adopt cloud apps …

Code analysis and app security testing simplified

Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker’s attacks to pinpoint …

Flash 0-day exploited in watering hole attacks, Adobe provides patch

Adobe has pushed out new versions of Flash Player for Windows, Mac and Linux, as a newly discovered zero-day vulnerability affecting the software is being actively exploited …

XSS bug in popular Chinese site exploited to launch DDoS attack

DDoS mitigation firm Incapsula has put a stop to the speculations that the video content provider whose vulnerable website was misused to launch a DDoS attack was YouTube, and …

Mozilla offers $10,000 for bugs in its new cert verification library

In the wake of the recent discoveries of the Heartbleed OpenSSL bug and the SSL “gotofail” bug, Mozilla has announced a new and topical bug bounty program: it …

ISACA launches cybersecurity skills and certification program

One in five IT security professionals say their enterprises have been the target of an advanced persistent threat (APT) yet 62 percent of organizations have not increased …

IE 0-day exploit actively used in attacks against US-based firms

Late on Saturday, Microsoft has published a security advisory warning about “limited, targeted attacks” exploiting a newly discovered zero day vulnerability that …

Biggest EU cyber security exercise taking place today

Today European countries kick off the Cyber Europe 2014 (CE2014), a sophisticated cyber exercise, involving more than 600 security actors across Europe. More than 200 …

Week in review: OpenBSD team forks OpenSSL, tech giants to fund open source projects, VPN users endangered by Heartbleed

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Supposedly patched router backdoor was simply hidden When …

US DOJ asks Supreme Court to allow warrantless cell phone search

“Kill switches” for mobile phones seems like a great idea for discouraging rampant mobile phone theft going on in the US. As a matter of fact, a bill introduced to …

IoT is inevitable, but security and privacy is a top concern

The Internet of Things – everyday objects connected to the Web – currently seems like an inescapable future. There is a market for such things and devices, but …

Infosec problems create stress for IT departments

A new IT Admin Stress Survey from GFI Software revealed that 68% of IT staff are actively considering leaving their current role due to job-related stress, despite apparent …

Don't miss

Cybersecurity news