>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Google and EU debate on implementation of “right to be forgotten”

It is, by now, widely known that European users can ask Google to “forget” sites with content these users find damaging to their reputation, but the European Court …

Fake GoogleBots are third most common DDoS attacker

An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting to web operators and SEO …

New type of ransomware bucks established trends

Ransomware is now one of the fastest growing classes of malicious software, says Kaspersky Lab researcher Fedor Sinitsyn. This should not comes as a surprise, when we know …

Open source responsible disclosure framework released

Bugcrowd, known for crowdsourced security testing, publicly released a new guide for companies looking to set up their own responsible disclosure programs. Developed in …

Is private cloud holding Feds back?

The Federal Government could save $18.9 billion annually by migrating services and applications to the cloud, according to MeriTalk and AT&T. The survey also found that …

European Central Bank blackmailed in wake of data breach

The European Central Bank (ECB) – the central bank for the euro – has suffered a data breach, and has only discovered it after receiving a blackmail letter from …

Apple confirms iOS backdoors, researcher says explanation is misleading

In the wake of the discovery of undocumented features in Apple’s iOS that can serve as backdoors, the company has modified a knowledge base article to enumerate and …

Six men charged in StubHub cyber-theft case

Six individuals have been charged in the US in connection with an international cybercrime ring that was able to take over StubHub user accounts, steal personal identifying …

Infographic: 25 years of the firewall

This month the firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. Click on the image below to download the complete …

How organizations deal with BYOD and mobile security

A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as …

Intel unveils SSD Pro 2500 self-encrypting drives

Intel announced the Intel SSD Pro 2500 Series, which offers IT departments peace of mind with advanced security features and capabilities. Managing data security is critical …

Operation Emmental exploits holes in banking security

Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks. They dubbed it Emmental, after the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools