Please turn on your JavaScript for this page to function normally.
IBM prevents services from running compromised code

IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …

How human behavior affects malware and defense measures

Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …

CIOs will continue to focus on business intelligence and analytics

The CIO focus on business intelligence (BI) and analytics looks set to continue through 2017, according to Gartner. Gartner said that the benefits of fact-based …

Building an OATH-compliant authentication server for less than $100

Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …

Resurgence of malware signed with stolen certificates

Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …

NSA can easily decrypt private cell calls

A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …

Shady Android AV pushed onto unsuspecting users

A deceptive advertising campaign pushing a shady antivirus solution is actively targeting Android users, warns Malwarebytes’ Armando Orozco. The pop-ups are triggered …

WhatsApp-themed spam campaign delivers malware

A new WhatsApp-themed spam campaign has been spotted targeting users of the popular IM service. The spam email claims to be a notification about a voice message someone left …

Gamers attacked 11.7 million times in 2013

Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …

How competitive is your cybersecurity team?

SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo, identified compensation for eight categories of information security staff – from CISOs …

IT pros are playing cat and mouse with cybercriminals

IT professionals admit to feeling lost when it comes to trying to protect the company against cyber attacks and cybercriminals. This could be a big problem for all of us, as …

Online behaviors that increase the risk of identity theft

PrivacyGuard released the results of a survey aimed at observing and identifying a number of online behaviors that consumers willingly partake in that could put them at risk …

Don't miss

Cybersecurity news