70% of IT pros experience weekly phishing attacks
69 percent of IT professionals experience phishing attacks at least once a week, with customer data cited most often as the type of data attacked, followed by financial …
eBook: BYOD Policy Roadmap
Every business needs a clearly articulated position on BYOD, even if it chooses not to allow for it. What’s your position? Do you even have one? If you’re …
Week in review: PoS security, the Black Hat Arsenal, and securing the U.S. electrical grid
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Securing the U.S. electrical grid The Center for the Study of …
Heartbleed still a critical threat
Cyber attackers have been quick to exploit the Hearbleed OpenSSL bug, to the tune of hundreds of thousand attacks per day in the week after the public revelation of its …
JPMorgan attackers altered bank records
The number of US banks that have apparently been targeted and breached by hackers is slowly rising, as newer reports say that seven financial organizations have been hit. …
Google reassures enterprise users with independent security audits
Google is doing everything it can to restore the confidence in its products that some users lost in the aftermath of Edward Snowden’s revelations about NSA spying. Among …
A closer look at Acunetix Web Vulnerability Scanner
Acunetix Web Vulnerability Scanner automatically checks your web applications for SQL Injection, XSS and other web vulnerabilities. Features: AcuSensor Technology SQL …
Phishers targeting crypto currency and retail sites
Online payment services and crypto-currency sites are being targeted by phishers. The number of phishing attacks remained high, and the second quarter of 2014 saw the …
Netflix open sources tools for detecting planned attacks
Making good on their word to open source many of their internally developed tools and libraries, Netflix has released three new tools that allow security teams to keep an eye …
DHS urges website admins to minimize risk of Google hacking
It’s a widely known fact that Google Search is a valuable tool for attackers looking for a way into organizations’ information systems. “Google …
Beware of malicious “Windows 9 free download” offers
The developer preview release of Windows 9 is scheduled to be publicly available this September, and cyber crooks have already started peddling bogus versions of the announced …
FBI investigating JPMorgan, US banks breaches
In the wake of reports that several big US financial institutions have had their networks compromised by hackers this month, the FBI and the Secret Service have mounted an …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices