Financial services cyber security trends for 2014
Five years ago, questions directed at boards of directors and senior executives at financial services firms on the toughest risk management issues might have resulted in …
Spoofed MasterCard warning delivers malware
A worrisome email notifying users that their MasterCard debit card has been blocked just when most of them are trying to do their holiday shopping has been landing in inboxes …
Hackers’ server with over 2 million stolen passwords found
Every now and then, security researchers come across a server used by hackers to store stolen account credentials. The latest instance of this has been flagged by Daniel …
Police arrests Chinese Bitcoin exchange owners suspected of fraud
Three individuals allegedly involved in the recent ransacking of the Hong Kong-based Global Bond Limited Bitcoin exchange have been arrested in China. According to a report by …
ENISA provides new guide for mitigating ICS attacks
The EU’s cyber security agency ENISA has provided a new manual for better mitigating attacks on Industrial Control Systems (ICS), supporting vital industrial processes …
Over 80% of employees use unauthorized apps at work
More than 80 percent of employees admit to using non-approved SaaS applications in their jobs, say the results of a McAfee survey. But what’s even more interesting is …
Fake Amazon “Order Status” emails deliver malware
It comes as no surprise that as holiday shoppers begin to flood the internet looking for deals, the bad guys will be right behind them hoping to swoop in on an unsuspecting …
9 out of 10 consumers would rather companies didn’t store their info
In the wake of data scandals, consumer trust in data security has hit a ten year low, with over 1 in 10 suffering from a data loss, Fujitsu’s data research report has …
Passwords aren’t going away any time soon
Despite nearly weekly revelations of new password database breaches, a survey by Authentify suggests that passwords will remain the primary protection for online accounts. Of …
Researchers prove malware can communicate via computer speakers and microphones
Physically isolating critical systems from networks and systems that are unsecured has long been used as a simple way to protect the former from unwanted intrusions and …
Rogue apps can remove Android device locks
Security researchers from German IT consultancy Curesec have uncovered the existence of an Android flaw that could allow hackers to remove all existing device locks activated …
Wisconsin man sentenced for DDoS attack against Koch Industries
A Wisconsin man has been sentenced to two years federal probation and ordered to pay restitution for taking part in a 2011 DDoS attack mounted against the official website of …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices