Please turn on your JavaScript for this page to function normally.
80% of digital publishers don’t know how their web traffic is audited

The burden of proof is on publishers to defend their web traffic, yet 80 percent admit they don’t have insight into how their traffic is audited, raising questions about which …

Industry
Cybersecurity advice for the nuclear industry

Less complexity, an active defense, transformative research, and institutionalized cybersecurity should be nuclear industry’s key priorities to stem the rising tide of …

tunnel light
Announced: Independent OpenVPN security audit

VPN service Private Internet Access (PIA) has just announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of …

kaspersky Lab KIPS
Cybersecurity gamification: A shortcut to learning

Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …

(IN)SECURE Magazine 52
(IN)SECURE Magazine issue 52 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 52 has been released today. Table of contents …

danger
Next year, attacks will differentiate to penetrate new vulnerable surfaces

The upcoming year will include an increased breadth and depth of attacks, with malicious threat actors differentiating their tactics to capitalize on the changing technology …

PoS
PoS attacks: Undetected vulnerabilities lay in wait

Attivo Networks issued a report detailing severe vulnerabilities in the nation’s POS systems that could lead to large breaches during the Holiday shopping period and on into …

bomb
323,000 pieces of malware detected daily

According to Kaspersky Lab, the number of new malware files detected by its products in 2016 increased to 323,000 per day. This is an increase of 13,000 from the amount in …

smart toys
Popular smart toys violate children’s privacy rights?

My Friend Cayla and i-Que, two extremely popular “smart” toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and …

Sony IP camera
80 Sony IP camera models come with backdoors

80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it …

phishing
Over 400,000 phishing sites have been observed each month during 2016

84 percent of phishing sites observed in 2016 existed for less than 24 hours, with an average life cycle of under 15 hours. The data collected by Webroot shows that …

watch
Top 4 global security threats businesses will face in 2017

The Information Security Forum (ISF) has announced their outlook for the top four global security threats that businesses will face in 2017. “The pace and scale of …

Don't miss

Cybersecurity news