What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Walking through Hack In The Box 2014 Amsterdam
This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …
Malware creation breaks all records! 160,000 new samples every day
Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …
Dissecting April’s malicious spam
Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the …
Free mobile privacy platform unveiled
Boolean Tech announced ShieldMe, a secure and free mobile privacy platform that allows users to connect with other people without ever giving up their phone number. ShieldMe …
Hacking for the greater good
As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …
Healthcare industry lags in security effectiveness
BitSight analyzed Security Ratings for S&P 500 companies in four industries – finance, utilities, retail and healthcare and pharmaceuticals. The objective was to …
Misconfiguration to blame for most mobile security breaches
Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …
Biometric tool prevents fraud
BioCatch launched its eCommerce fraud prevention solution. The new tool uses behavioral biometric analysis to detect suspicious behavior and authenticate repeat customers, …
Inside the malware war zone
Adam Kujawa is the Head of Malware Intelligence for Malwarebytes. In this interview he talks about the evolution of malware in the past decade, illustrates the differences in …
8 key cybersecurity deficiencies and how to combat them
While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …
Employee behaviors expose organizations to insider threat
A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits