Are you prepared for dealing with a breach?
RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …
CSA to hold hackathon featuring $10,000 prize
The Cloud Security Alliance (CSA) will hold its third Hackathon at the RSA Conference 2015 in San Francisco, to continue to test the CSA Software Defined Perimeter …
Firefox loses opportunistic encryption feature due to critical flaw
Less than a week after it made Firefox 37 available for download, Mozilla is pulling one of the security features it implemented. Mozilla is urging users to update again, to …
New crypto-ransomware “quarantines” files, downloads info-stealer
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for …
How to keep your Facebook account secure
When last November Facebook asked users to comment the proposed changes to the social network’s terms of use, data policy, and cookies policy, it also introduced Privacy …
Snapchat blocks third-party apps from accessing its APIs
Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app’s internal API has been reverse-engineered …
Qualys experts and customers to present security best practices at RSA Conference 2015
The Qualys CEO Philippe Courtot will deliver the opening keynote presentation at CSA Summit during RSA Conference 2015. The keynote discusses how the cloud has forced …
Cyber crooks go after enterprise millions with Dyre malware, social engineering
“An experienced and resource-backed cybercrime gang” is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal …
What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion
Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …
Mozilla revokes trust for CNNIC certificates
Mozilla has joined Google in revoking trust for certificates issued by the China Internet Network Information Center (CNNIC) Certificate Authority. CNNIC is the administrative …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”
- Python Foundation rejects US government grant earmarked for security improvements
- AI agents can leak company data through simple web searches