Please turn on your JavaScript for this page to function normally.
Microsoft releases Enhanced Mitigation Experience Toolkit 4.0

Microsoft has announced the release of version 4.0 of its popular Enhanced Mitigation Experience Toolkit (EMET), a free utility that helps prevent memory corruption …

Is accessing work apps on the move destructive?

There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …

New regulation for ENISA, the EU cybersecurity agency

EU cybersecurity agency ENISA has received a new Regulation, granting it a seven year mandate with an expanded set of duties. ENISA’s Executive Director, Professor Udo …

Key obstacles to effective IT security strategies

Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …

F-Secure advances fight against exploits

Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …

U.S. tech companies sharing bug info with U.S. govt before releasing fixes

A recent report by Bloomberg’s Michael Riley has revealed that a great many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national …

Guccifer hacks U.S. nuclear security agency chief

The hacker that goes by the online moniker “Guccifer” continues his crusade agains U.S. current and former government officials, and his latest victim is Neile …

Facebook, Microsoft and Apple disclose little on U.S. government data requests

The disclosure of details about the controversial PRISM program set up by the NSA has indubitably damaged the reputation of the companies involved in it, and some of them are …

British GCHQ spied on G20 delegates to gain advantage in talks

The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …

Account takeover attempts have nearly doubled

ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …

It takes 10 hours to identify a security breach

Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Don't miss

Cybersecurity news