Encrypted messaging and file storage app Peerio goes open beta
Canada-base Peerio has released the beta version of an app of the same name which combines secure messaging, file sharing and storage, and adds encryption to it. Peerio is …
Five key security, identity and access management trends
CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
New version of Cryptowall ransomware spotted doing rounds
The infamous Cryptowall ransomware is back: the newest version has been spotted compromising users starting on January 12. According to both Microsoft and the researcher that …
Beware of malware masquerading as Oracle security patches
Oracle is warning users about malware sites actively offering Oracle patches for download. “It has come to our attention that there are non-Oracle sites offering Oracle …
Skeleton Key malware makes all passwords valid
Researchers from the Dell Secureworks CTU team have unearthed a new type of malware whose goal is to allow attackers to bypass authentication on Active Directory (AD) systems …
Reactions to David Cameron’s plan to ban end-to-end encryption
On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …
January’s Patch Tuesday marks the start of a new era
Microsoft’s January 2015 patch Tuesday marks the start of a new era. It seems that Microsoft’s trend towards openness in security has reversed and the company that …
Cyber attacks demonstrated on autonomous ground vehicles
Mission Secure Inc. (MSi), a cyber defense technology and solutions provider, and Perrone Robotics Inc. (PRI), a provider of robotic and autonomous ground vehicle solutions, …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
GFI adds multi server tools to mail security in MailEssentials 2015
GFI Software released GFI MailEssentials 2015, an evolution of the email security platform that adds major enhancements including scalability and load balancing capabilities …
Unfazed by Microsoft’s criticism, Google discloses another Windows 8.1 flaw
Google apparently has no mercy for Microsoft’s developers, and is determined to stick to its 90-day deadline for fixing software flaws, as it publicly released details …
Featured news
Resources
Don't miss
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys