Widespread disregard for corporate cloud policies
While most business professionals are worried about the security of cloud-based applications, they are not deterred from using them to store their personal and professional …
Researcher despairs of critical SIM flaws being fixed before attacks happen
Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …
Cisco enhances safety and security solutions
Cisco announced enhancements to its portfolio of safety and security solutions with video surveillance architectures and new Internet of Things (IoT) enabled solutions that …
A short overview of Android banking malware
As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …
IE 0-day attack reports push ISC to raise official threat level
Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …
Federal cyber security pros lack confidence in FISMA
A report by MeriTalk and NetApp examines the state of cyber security at Federal agencies and looks at whether the Federal Information Security Management Act (FISMA) is …
Big data investments continue to rise
Big data investments in 2013 continue to rise, with 64 percent of organizations investing or planning to invest in big data technology compared with 58 percent in 2012, …
Is your status update also a red flag for danger?
In this digital age when our whole lives are online, it is no surprise that security has become an increasing concern of many. Whilst you’re busy worrying about your …
HP unveils new family of next-generation firewall appliances
HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing. …
Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight
Here’s an overview of some of last week’s most interesting news and articles: NSA impersonated Google in MitM attacks After all the recent revelations about the …
RSA advises customers to stop using NSA-influenced encryption algorithm
In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …
Clever email campaign delivers deadly ransomware to orgs
A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …
Featured news
Resources
Don't miss
- AI agents can leak company data through simple web searches
- Early reporting helps credit unions stop fraudulent transfers faster
- Product showcase: Syteca – The human-centric insider threat management platform
- Scammers target international students by threatening their visa status
- Proximity: Open-source MCP security scanner