>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

WinYahoo adware changes your Chrome secure preferences

“Potentially unwanted programs (PUPs) might not be as dangerous as malware, but can often lead to unexpected perils. Take for example WinYahoo. Despite it’s name …

APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal

“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …

11-year-old VM escape bug opens host machines to compromise

CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …

BitTorrent releases free P2P private voice and text app

After an initial pre-alpha release in July 2014, BitTorrent’s peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and …

entrepreneur
Do ethics get in the way of security professionals?

While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …

Scammers are draining payment cards linked with Starbucks customer accounts

Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.In order to perform this …

May Patch Tuesday delivers critical and important fixes

In this month’s Patch Tuesday Microsoft has released 13 security bulletins addressing 48 vulnerabilities in Internet Explorer, Windows, Office, and Silverlight.Over half …

Data breaches lead to surge of spoofing attacks

The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …

Can you correctly identify phishing emails?

An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …

CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Former employee claims cybersecurity firm extorted clients

Tiversa, a privately held cybersecurity company based in Pittsburgh, Pennsylvania, has been accused by a former employee of hacking and then trying to effectively extort money …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools