Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
When can you trust web services to handle your data?
A new report by the EU’s cyber security agency ENISA analyses the conditions under which online security and privacy seals help users to evaluate the trustworthiness of …
Mobile applications being used for DDoS attacks
Prolexic Technologies reported that mobile applications are being used in DDoS attacks against enterprise customers. “The prevalence of mobile devices and the widespread …
Light Patch Tuesday delivers four bulletins
With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …
Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
(ISC)2 Foundation offers $145,000 in information security scholarships
The (ISC)2 Foundation, the non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life with community cyber …
One in five SMB retailers lacks security fundamentals
Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …
Privacy takes center stage
AnchorFree anticipates digital privacy, security and access concerns will escalate in 2014 as the following consumer trends take shape. Shift to private and erasable social …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help