Cisco projects data center traffic will nearly triple
In the fourth annual Cisco Global Cloud Index, Cisco forecasts continued strong growth of cloud traffic, cloud workloads and cloud storage with private cloud significantly …
INTERPOL World 2015 expects high-level international participation
More than 70 percent of the exhibition space for INTERPOL World, a new international security event taking place from 14-16 April 2015 in Singapore, has been booked by key …
Dridex-laden spam emails targeting First World bank users
Dridex, a relatively new and improved version of the infamous Cridex/Feodo banking Trojan, is being widely disseminated via email spam campaigns. First spotted in July 2014, …
Facebook open sources Proxygen, C++ HTTP framework + server
After having open sourced the OS analysis tool osquery a week ago, Facebook has announced on Wednesday that Proxygen – a collection of C++ HTTP libraries and an …
Website fined for leaking encrypted card details and decryption key
The UK Information Commissioner’s Office (ICO) is warning organizations that they must make sure their websites are protected against one of the most common forms of …
WireLurker: Unprecedented iOS, OS X malware hits users
Palo Alto Networks researchers have unearthed a new family of Apple OS X and iOS malware that is able to compromise even non-jailbroken iOS devices through enterprise …
Accuvant and FishNet Security join to create new company
Accuvant and FishNet Security have signed a definitive agreement to join forces and create a new, combined company. The transaction is expected to close in the first quarter …
Rovnix Trojan infection spree targets UK
A new cluster of infections by the Rovnix Trojan is raising concerns of widespread confidential data theft in the UK, warns Bitdefender. The company’s research teams …
Inside corporate privacy programs at Fortune 1000 companies
The International Association of Privacy Professionals (IAPP) released a survey of corporate privacy programs at Fortune 1000 companies. The survey found that while corporate …
What attackers do after bypassing perimeter defenses
Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass …
Unsurprisingly, most believe their personal data is not secure
Confronted with new breaches reported in the media every week, nearly two out of three Americans (61% believe their personal data is not secure, according to PKWARE. Theft of …
New technique makes phishing sites easier to create, more difficult to spot
Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form. …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed