Google and EU debate on implementation of “right to be forgotten”
It is, by now, widely known that European users can ask Google to “forget” sites with content these users find damaging to their reputation, but the European Court …
Fake GoogleBots are third most common DDoS attacker
An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting to web operators and SEO …
New type of ransomware bucks established trends
Ransomware is now one of the fastest growing classes of malicious software, says Kaspersky Lab researcher Fedor Sinitsyn. This should not comes as a surprise, when we know …
Open source responsible disclosure framework released
Bugcrowd, known for crowdsourced security testing, publicly released a new guide for companies looking to set up their own responsible disclosure programs. Developed in …
Is private cloud holding Feds back?
The Federal Government could save $18.9 billion annually by migrating services and applications to the cloud, according to MeriTalk and AT&T. The survey also found that …
European Central Bank blackmailed in wake of data breach
The European Central Bank (ECB) – the central bank for the euro – has suffered a data breach, and has only discovered it after receiving a blackmail letter from …
Apple confirms iOS backdoors, researcher says explanation is misleading
In the wake of the discovery of undocumented features in Apple’s iOS that can serve as backdoors, the company has modified a knowledge base article to enumerate and …
Six men charged in StubHub cyber-theft case
Six individuals have been charged in the US in connection with an international cybercrime ring that was able to take over StubHub user accounts, steal personal identifying …
Infographic: 25 years of the firewall
This month the firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. Click on the image below to download the complete …
How organizations deal with BYOD and mobile security
A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as …
Intel unveils SSD Pro 2500 self-encrypting drives
Intel announced the Intel SSD Pro 2500 Series, which offers IT departments peace of mind with advanced security features and capabilities. Managing data security is critical …
Operation Emmental exploits holes in banking security
Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks. They dubbed it Emmental, after the …
Featured news
Resources
Don't miss
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks