Microsoft details risks of running unsupported software
Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …
Obama orders NSA to stop spying on UN diplomats
There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …
Women crucial for taking infosec industry to next level
Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …
When the phone call is more dangerous than malware
During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …
Secure corporate BYOD solution by ForeScout
ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …
RSA takes a big data approach to help with high-risk threats
RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …
US legislators introduce bill to end dragnet phone data collection
US Senate Judiciary Committee Chairman Patrick Leahy and Congressman Jim Sensenbrenner, chairman of the Crime and Terrorism Subcommittee in the House, introduced on Tuesday a …
AmEx users targeted with well-crafted phishing scheme
A rather well-executed phishing campaign is targeting American Express users via fake “Fraud Alert: Irregular Card Activity” emails impersonating the AmEx Fraud …
Syrian hackers hijack Obama’s tweets
The Syrian Electronic Army has apparently managed to modify tweets from Barack Obama’s official Twitter account to include links to a pro-Assad video, as well as …
Photoshop source code stolen, 38M users affected in Adobe hack
Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …
The future? Big data and intelligence driven security
As we produce and consume an increasing amount of digital data, even the casual user is becoming aware that the way we store and access this data will continue to shift and …
93% of firms increasing cyber-security investments
93% of companies globally are maintaining or increasing their investment in cyber-security to combat the ever increasing threat from cyber-attacks, according to a new survey …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity