European NSA is not a solution
The European Parliament should use its powers to reconsider EU-US data transfer deals and push for the creation of a European privacy cloud, EU-level protection for …
Fear of attacks leads to highly emotional decision making
Recent publicity about cyberattacks and data security breaches has increased IT risk awareness among CIOs, CISOs and senior business executives. However, Gartner’s 2013 …
Mikko Hypponen: How the NSA betrayed the world’s trust
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American …
HyTrust acquires HighCloud Security
HyTrust has acquired HighCloud Security, a provider of cloud encryption and key management software. By combining HyTrust’s administrative visibility and control with …
GFI MAX Mobile Device Management launched
GFI MAX announced GFI MAX Mobile Device Management (MDM), a new offering for managed services providers looking to create new revenue opportunities as increasing numbers of …
Silk Road 2.0 goes online
As announced by well-known Silk Road user named “The Godfather”, who has been doing business on the infamous underground market for the last few years, another …
Free eBook: 9 Steps to Cybersecurity
9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …
Microsoft and Facebook start Internet-wide bug bounty program
Dubbed The Internet Bug Bounty, it is sponsored by the two Internet giants and is aimed at anyone who discovers vulnerabilities in a series of open source programming …
PCI DSS 3.0 is now available
Today the PCI Security Standards Council (PCI SSC) published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). …
Another Android “master key” bug revealed
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a.k.a Saurik), the …
Cybercriminals opting for real-time malware campaigns and phishing
The third quarter of 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites, according to Commtouch. The ever-growing exploitation of …
Svpeng Android banking Trojan goes phishing
The Android banking Trojan known as Svpeng has been improved by its creators and is now capable to perform phishing attacks as well as stealing money directly from a …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)