Please turn on your JavaScript for this page to function normally.
Password security is not just a user problem

When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …

People will do anything for free Wi-Fi

A new Wi-Fi investigation conducted on the streets of London shows that consumers carelessly use public Wi-Fi without regard for their personal privacy. In the experiment, …

Exploring today’s top security concerns

Security related topics are often front and center in the 24-hour news cycle, but what concerns Americans the most? According to a new national survey from University of …

Security policy management in hybrid cloud environments

A new survey by AlgoSec found that 79 percent of organizations need better visibility in order to unify security policy management across their on-premise and public cloud …

The Crime-as-a-Service business model

A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …

Seagate Surveillance HDD features recovery services

Seagate released a dedicated surveillance HDD featuring Seagate Rescue services. Engineered specifically for surveillance and video analytics applications, the Surveillance …

CloudFlare offers free SSL encryption

Web performance and security company CloudFlare today launched Universal SSL, making Secure Socket Layer (SSL) encryption available to anyone at no cost. “Yesterday …

Education is the key to increasing mobile security

The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Trust in the cloud is at an all-time low

Data security and trust in cloud-based services are a rapidly growing concern for IT decision makers within large organizations, according to a new global study from BT. While …

Week in review: Bash Shellshock bug, jQuery.com compromise, and a replacement for TrueCrypt

Here’s an overview of some of last week’s most interesting news and articles: Behavioral analysis and information security In this interview, Kevin Watkins, Chief …

Malvertising attack techniques dissected

At Virus Bulletin 2014, Bromium presented a research report that highlights the severe risk of malicious ad networks infecting end users. This research provides a real-world …

Making one organization’s incident everyone’s defense

The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools