Board practices regarding IT oversight and cybersecurity
Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …
Top tips to protect systems against insider misuse
The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …
jQuery.com compromised to serve malware via drive-by download
jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, has been compromised and has been redirecting visitors to a website hosting …
Beware of Apple Wave microwave wireless charging hoax
Excited about the new Wave iPhone wireless charging technology and can’t wait to try it out? Please don’t – it’s a hoax. You risk damaging both your …
Minimizing privacy risks of location data collection
With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …
High-volume DDoS attacks on the rise
A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of …
Blackphone and Silent Circle announce bug bounty program
Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …
Mobile device security is sacrificed for workforce efficiency
While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …
European banks and Europol join forces to fight cybercrime
The European Banking Federation (EBF) and Europol’s European Cybercrime Centre (EC3) signed a Memorandum of Understanding (MoU) which paves the way for intensifying …
McAfee delivers new security suites
McAfee released McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015 service that protects a customer’s …
Number of malicious eBay listings rises, accounts are hijacked
Pressure is mounting against eBay to quickly detect and remove bogus listings triggering cross-site scripting flaws to redirect users to phishing and other malicious pages. …
CipherShed: A replacement for TrueCrypt
Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation