US bank customers targeted with vishing messages
Customers of a number of US banks have recently been hit by Voice over IP phishing (vishing) attacks orchestrated by eastern European cyber crooks, warns John LaCour, founder …
Red Hat to acquire open source storage systems’ firm Inktank
Red Hat announced that it has signed a definitive agreement to acquire Inktank, a provider of scale-out, open source storage systems. Inktank’s flagship technology, …
SANS revamps its Memory Analysis Course
To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …
CISOs anxious about possible data breaches, employees not so much
If you are a Chief Information Security Officer, chances are you may not be getting much sleep lately according to a recent survey of IT security executives at companies of …
Stanford professor scrutinizes India’s biometric identification program
The cutting edge of biometric identification — using fingerprints or eye scans to confirm a person’s identity — isn’t at the FBI or the Department of Homeland …
Microsoft updates IE against latest 0-day, updates also XP
Microsoft has issued an out of band security update to patch the zero day vulnerability that affects all versions of Internet Explorer and is being actively exploited in the …
Sales drop as corporate data breaches rise
Consumers avoid doing business with a breached organization at an alarming rate, according to a new study commissioned by Identity Finder, the results of which were revealed …
ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
IT sec pros surprisingly cavalier about mobile security best practices
A flash poll conducted at Infosecurity Europe 2014 by Centrify Corporation has found that 94 per cent of IT security professionals use third party applications on their mobile …
IoT security requirements will reshape enterprise IT security programs
The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security …
CSA releases Software Defined Perimeter 1.0
The Cloud Security Alliance (CSA) announced at Infosecurity Europe 2014 the release of two key documents related to the CSA’s Software Defined Perimeter (SDP), an …
London warbiking reveals worrying state of Wi-Fi security
At Infosecurity Europe 2014, IT security company Sophos this week highlighted the worrying state of wireless security in the UK’s capital city, when it sent security …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous