Please turn on your JavaScript for this page to function normally.
Cost of Advanced Evasion Techniques in recent data breaches

A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats …

Simple steps to prevent data theft

HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …

Week in review: Banks sue Target and Trustwave, Basecamp DDoS, Fyodor restarts the Full Disclosure list

Here’s an overview of some of last week’s most interesting news, reviews and articles: Flaws in Android update mechanism could turn apps into malware A group of …

Mylar: A system that protects data against server-side snooping

A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …

WordPress sites hijacked via “free” premium plugins

If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …

Uncommon new worm targets Word and Excel files

Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …

Having a backup solution doesn’t prevent data loss

Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …

Challenges of running cloud-hosted applications

CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …

Analysis of three billion attacks reveals SQL injections cost $196,000

NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …

Does business understand IT security?

The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …

Cisco expands wireless LAN portfolio

Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …

Zorenium bot can now hit iOS users as well

If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …

Don't miss

Cybersecurity news