Please turn on your JavaScript for this page to function normally.
Governments unprepared for the impact of the big five IT trends

A new MeriTalk study, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud …

Sochi security forbids journalists to use private Wi-Fi

The Winter Olympics in Sochi are under way, and we have already written about the cyber risks awaiting visitors and viewers. But what about the ones awaiting the visiting …

Account details of 27,000 Barclays customers stolen, sold to brokers

(In)famous UK-based multinational bank Barclays has been hit this Friday with claims that someone has stolen personal and financial information of some 27,000 of its customers …

Sophos acquires Cyberoam Technologies

Sophos has acquired Cyberoam Technologies, a provider of network security products. The acquisition expands and deepens Sophos’ product portfolio in network security, by …

Trojan steals Bitcoins and targets OS X

SecureMac has discovered a new Trojan which targets OS X and spies on web traffic to steal Bitcoins. The OSX/CoinThief.A malware has been found in the wild, and there are …

Week in review: Flash flaw exploited in the wild, spies DoSed Anonymous, and how a fake antivirus attack works

Here’s an overview of some of last week’s most interesting news and articles: A solution for fixing hijacked Chrome settings According to Linus Upson, Google VP of …

Facebook bug prevents revocation of app permissions

Developers working for privacy software vendor MyPermissions claim to have discovered a critical vulnerability in Facebook’s code. The flaw can be exploited to make it …

Bogus Facebook “Look Back” video pages spread malware

If you are a regular Facebook user, chances are good that you have already watched a couple of “Look Back” videos compiled by your friends. Maybe you have even …

The FBI is looking for a “malware provider”

In a request for quote (RFQ) published on Monday, the Bureau has explained the reason behind their need: The Operational Technology Division (OTD), Investigative Analysis Unit …

Mobility is the weakest security link

Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …

What do government security pros think?

Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …

Trends in web application security

Despite web application vendors being more responsive and releasing security patches much faster than in 2012, new research revealed that it is still taking an average of over …

Don't miss

Cybersecurity news