Please turn on your JavaScript for this page to function normally.
Trends in Internet trust exploits, IoT, cyber espionage and privacy

In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …

Home Wi-Fi security is as bad as PC security in the 90s

Nearly three out of four internet-connected households in the UK are at risk of getting attacked through their wireless router, according to a recent study by Avast Software. …

POODLE attack now targeting TLS

There’s a new SSL/TLS problem being announced today and it’s likely to affect some of the most popular web sites in the world, owning largely to the popularity of …

Negotiating privacy in the age of Big Data

The promise of the Big Data revolution is all around us – improving our quality of life and providing us with new insights in culture, science, economics, and …

(IN)SECURE Magazine issue 44 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 44 has been released today. Table of contents: The …

Software security in a market for lemons

There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …

The rise of IoT 2.0 and the battle for the connected home

Sansa Security revealed the company’s Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year. 1. The rise of IoT …

What will create cybersecurity challenges in 2015?

Security experts at Unisys predicted even greater cybersecurity challenges in the year ahead as continued growth in the use of mobile devices and applications in the …

Whitepaper: 10 Things Your Next Firewall Must Do

NOTE: This whitepaper is no longer available, thanks for your interest. Over time, the fundamental functions your firewall executed have been nullified by the very traffic …

Free webinar: What’s new in ISO 27001 2013 revision

Register for this webinar to learn: Main changes in ISO 27001 2013 revision Required documents for the new ISO 27001 How the transition works with certification bodies 12 …

Week in review: Sony hack, turning kids into infosec heroes, and cybersecurity in 2015

Here’s an overview of some of last week’s most interesting news and articles: Protecting your child’s digital identity Kids’ identities are stolen over …

RFID forensic evidence management

Radio frequency identification (RFID) tags—devices that can transmit data over short distances to identify objects, animals or people—have become increasingly popular for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools