The dangers of Cyber Monday deals
Today is Cyber Monday, the day when shoppers concentrate on buying the tech they wanted to all year, for a fraction of the original price. In the wake of the …
Online shoppers are easily duped
A survey by One Poll and Dimensional Research on holiday shopping security practices evaluated online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., and …
If anything shouldn’t be taken for granted, it’s Information Security Management
It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …
Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud
Here’s an overview of some of last week’s most interesting news, interviews and articles: Fighting malware, emerging threats and AI Liran Tancman is the CEO of …
Siemens pushes out emergency SCADA updates
Siemens has released an out-of-band update for the SIMANTIC WinCC SCADA system, which is integrated in its PCS7 distributed control system and its TIA Portal, engineering …
How to evaluate national cyber security strategies
ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an …
How to detect fraudulent activity in a cloud without invading users’ privacy
A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …
Adobe urges users to implement critical out-of-band Flash Player update
For the second time in a month, Adobe has issued a security update for Flash Player. This out-of-band update finally fixes a critical vulnerability that could be misused by …
Most people don’t feel safe when shopping online
Most consumers do not feel safe when shopping online and many are shying away from their favorite retailers as a result, according to the NCC Group. According to the …
The rise of account takeovers
Account takeover fraud is the primary means of attack from fraudsters and attack origins occurring predominantly outside of the U.S., according to NuData Security. Account …
SaaS deployments are now mission critical
Global buyers of cloud applications cite cost, innovation and agility as reasons for adoption. In May and June 2014, Gartner conducted a survey across 10 countries in four …
Regin spy malware was used in Belgacom, EU government hacks
Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it’s likely wielded by the UK spy agency GCHQ and/or the US NSA. The …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity