Please turn on your JavaScript for this page to function normally.
The evolution of malware and the threat landscape

The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …

Microsoft adds new protection mechanisms to IE 10

At the CanSecWest conference held last week in Vancouver, a team of vulnerability researchers from French security firm VUPEN has managed to hack Microsoft’s Internet …

BYOD security for cloud Wi-Fi access

AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …

Fake online streaming service phishes and robs users

With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …

China escalating Tibetan cold war into cyberspace

AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …

Machine Learning for Hackers

If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …

Microsoft patches seven distinct vulnerabilities

We have a total of six bulletins from Microsoft this month, addressing seven distinct vulnerabilities. It’s a pretty light month, but all of your focus should be on …

Apple fixes 83 vulnerabilities in Safari

Apple issued a patch for Safari, fixing 83 vulnerabilities, 72 of which were rated critical. Since Safari and Chrome both use WebKit, the open-source browser engine, it allows …

19-year-old wins UK Cyber Security Challenge

Computer sciences student Jonathan Millican from North Yorkshire is the winner of the latest edition of the UK Cyber Security Challenge, having successfully passed a number of …

Data protection risks on mobile devices

An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …

Dell to acquire SonicWALL

Dell has signed a definitive agreement to acquire SonicWALL, a provider in advanced network security and data protection. SonicWALL expands Dell’s growing security …

Eliminating the need for multiple passwords

OneID announced the developer release of its service that eliminates the need for multiple usernames and passwords. Using the OneID service, consumers can sign in to websites …

Don't miss

Cybersecurity news