Orgs choose network performance over security
An alarming number of organizations are disabling advanced firewall features in order to avoid significant network performance degradation, say the results of the Network …
Fake “Online Ebola Alert Tool” delivers Trojan, unwanted apps
Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus. While Ebola-themed online hoaxes are nothing new, …
Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …
Samsung users could be locked out of their devices by attackers
A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …
US ICS operators under attack by crims wielding BlackEnergy malware
The US ICS-CERT has issued a warning about an ongoing sophisticated malware campaign that has hit a number of industrial control systems (ICSs) environments using a variant of …
10% of employees unaware if they have an IT department or not
A transatlantic survey of 2000 employees has found that only a fifth of UK workers think their data is more secure at work than at than at home, whereas the majority of US …
IT is losing the battle on security in the cloud
A majority of IT organizations are kept in the dark when it comes to protecting corporate data in the cloud, putting confidential and sensitive information at risk. This is …
Russian-based cyber spies going after military, intelligence targets
FireEye today released a comprehensive intelligence report that assesses that an advanced persistent threat (APT) group may be sponsored by the Russian government. The report …
ScanBox keylogging framework lurking on disparate watering holes
Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …
Belgacom shares more details about alleged GCHQ breach
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
The chip and PIN payment card system – or EMV – is considered to be more secure than the magnetic strip one, but it’s also not bulletproof. Nevertheless, US …
246 percent spike in Apple-themed phishing scams
Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?