What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion
Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …
Mozilla revokes trust for CNNIC certificates
Mozilla has joined Google in revoking trust for certificates issued by the China Internet Network Information Center (CNNIC) Certificate Authority. CNNIC is the administrative …
Digital privacy and Internet security to intersect at Digital Rights Europe
Digital Rights Ireland, Ireland’s leading digital rights advocacy group, has gathered an expert group of Irish and international speakers for the inaugural Digital …
Guidelines on the auditing framework for Trust Service Providers
A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity …
Google boots unwanted ad injector extensions from Chrome Web Store
Google is done with tolerating sneaky ad injectors and, following the results of a study they recently conducted, they removed from the Chrome Web Store 192 deceptive Chrome …
Google decides to stop trusting CNNIC certificates
In the wake of last week’s incident caused by the issuance of unauthorized digital certificates for a number of Google domains by the hands of MCS Holdings, an …
US to enact sanctions against foreign cyber attackers
US president Barack Obama has signed on Wednesday a new executive order aimed at imposing “sanctions on individuals or entities that engage in malicious cyber-enabled …
Crypto ransomware sightings and trends for Q1 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the …
What’s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment …
Don’t just deploy a backup solution and hope for the best
Employing a backup solution does not entirely eliminate data loss, according to Kroll Ontrack. The 2015 survey of customers who lost valuable computer data confirms that the …
Feds subpoena Reddit for info on DarknetMarkets subreddit users
A US Immigrations and Customs Agency (ICE) special agent has recently issued a subpoena to popular social news site Reddit, asking them to share the information they might …
Featured news
Resources
Don't miss
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs