FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …
Insider threats 101: The threat within
Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of …
Payment gateway provider breached
New Jersey-based Charge Anywhere, whose electronic payment gateway solutions route payment transactions from merchants’ Point-of-Sale (PoS) systems to their payment …
Do senior executives understand their role in data security?
There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …
10 strategies to protect patient information
Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …
Security deficiencies that increase data breach risk
Many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches. Based on a global survey of …
Security trends you should NOT worry about in 2015, and five you should
Along with its latest predictions, which examine the likelihood of common network security prophecies next year, WatchGuard’s security research team also included five …
Browser vulnerabilities to become biggest endpoint challenge
A growing number of flaws in web browsers is viewed as the biggest endpoint security headache by today’s IT decision-makers, according to Malwarebytes. With the number …
Corporate data: Protected asset or a ticking time bomb?
Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they …
Cyber attacks now longer than ever
Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, 52% of respondents …
Microsoft released seven advisories, three are critical
December’s Patch Tuesday brings us seven advisories, three of which are listed as Critical. Depending on how you want to count it, we see a total of 24 or 25 CVEs …
Linux backdoor used by Turla APT attackers discovered, analyzed
Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services