
Surge in memcached-based reflected DDoS attacks is due to misconfigured servers
Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers …

Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …

Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …

UK cyber risk picture: Emergency services at risk of a major cyber attack
The UK’s emergency services are at risk of a major cyber-attack. This is the finding of a new landscape analysis, issued by intelligence provider Anomali. The UK Threat …

How Google implements the Right To Be Forgotten
Who is asking Google to delist certain URLs appearing in search results related to their name, and what kind of requests does the search giant honor? The company has been …

Mobile banking Trojans spread confusion worldwide
Consumers around the world that use mobile banking apps are at a greater risk of being tricked by cybercriminals and falling victim to mobile banking theft. This is according …

Is that smart device secure, and will it protect your privacy?
The decision to introduce a new smart device into your home should come only after you’ve answered these two questions affirmatively: “Will the device improve the …

Private browsing is not that private, but it can be
Private, “Incognito mode” browsing sessions are not as foolproof as most users believe them to be. “After a private session terminates, the browser is …

A view of the global threat landscape: Cybercrime and intrusion trends
Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, …

Global megatrends that are problematic for the state of cybersecurity
The majority of senior-level IT professionals fully expect their organization will experience a catastrophic data breach that could greatly impact shareholder value, according …

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity
Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have …

ISO 27001 & cybersecurity training and qualifications: Now in New York
Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and live and online …