Internet of Things predictions for 2015
IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …
Best practices in knowledge-based authentication
Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …
Google simplifies CAPTCHAs down to a single click
Tired of solving CAPTCHAs? Google has just the thing for you. The company has introduced the latest iteration of its reCAPTCHA tool, and it most cases, it will allow users to …
Sony breach: More leaks expose employees’ salaries, personal data
The fallout from last week’s breach of Sony Pictures Entertainment networks continues to increase, as the attackers leaked more stolen data on Pastebin on late Monday …
2015 predictions: Cyber attacks aimed at critical infrastructure, Attacks as a Service
In 2014, we witnessed the rise of POS malware and ransomware, more targeted, advanced evasion by both cyber crooks and hackers backed by nation states, and government grade …
New LusyPOS malware is a cross between Dexter and Chewbacca
A new piece of Point-of-Sale RAM scraping malware has been submitted to VirusTotal and analyzed by researchers, who found that it’s a cross between two older and …
Firefox 34 comes with critical security updates
Firefox 34 includes eight security updates, three of which are Critical, three High and two moderate. MSFA-2014-91 Privileged access to security wrapped protected objects …
The 2014 Firewall Buyers Guide
NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …
FBI issues warning on destructive malware
Last week’s breach of Sony Pictures Entertainment networks and the disabling of employees’ computers has likely been the incident that spurred the FBI to release a …
Hackers hit execs for insider info to gain stock market advantage
FireEye’s researchers have identified yet another hacking group. Dubbed FIN4, the hacking crew seems to be comprised of native English speakers with “deep …
Coordinated cyber attacks on global critical infrastructure exposed
Cylance identified coordinated attacks by hackers based in Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of …
VPN providers urged to update OpenVPN due to critical DoS bug
The OpenVPN Project has issued a new version of its popular open source software of the same name and is urging users to implement it, as it solves a critical denial of …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous