Don’t wait until you’re attacked to take cybersecurity seriously
CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
AT&T: Pay more if you don’t want to share data for personalized ads
If you are a customer of AT&T’s GigaPower fiber-optic Internet access service and you don’t want to see personalized ads based on your browsing history, …
New Android Trojan fakes device shut down, spies on users
A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take …
Darkleaks: An online black market for selling secrets
Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …
Lenovo computers come with pre-installed adware and MITM proxy
If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even …
Lepide Exchange Recovery Manager 15.0 released
Lepide Software released version 15.0 of Lepide Exchange Recovery Manager. The latest version allows users to add Office 365 as Source directly in Lepide Exchange Recovery …
Visual hacking exposed
While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …
6 steps for effective rights management
Significant data breaches in both government and industry are in the headlines at an unrelenting pace. Some of these breaches are enormous in scale and impact, and all have …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
GnuPG 2.0.27 released
GnuPG is a complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system as …
Featured news
Resources
Don't miss
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory