Please turn on your JavaScript for this page to function normally.
Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero

Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …

40% of IT security teams keep executives in the dark

A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …

Are endpoints the most vulnerable part of the network?

Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …

Acunetix offers free network security scan

Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …

Seagate delivers five new NAS products

Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited for the home office to small businesses with up to 50 employees. The …

How hackers get in: Lessons from a network security audit

Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern …

Exposing the insecurity of hotel safes

Travel documents, cash, mobile devices, cameras, jewellery and company documents – on holiday or on a business trip, tourists and business people alike often carry …

63% of businesses don’t encrypt credit cards

In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …

Pushdo Trojan infects 11,000 systems in 24 hours

Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with …

New IP-based wireless networking protocol created

Recognizing the need for a better way to connect products in the home, seven companies announced that they’ve joined forces to develop Thread, a new IP-based wireless …

49% of security pros think Java apps are vulnerable to attacks

In a recent poll, half of the senior IT professionals polled said their Java applications are vulnerable (32%) or very vulnerable (17%) to attacks. They cited insecure coding …

Cloud Security Alliance updates guidance documents

The Cloud Security Alliance (CSA) announced significant updates to two de facto industry standards, the Cloud Controls Matrix (CCM) Version 3.0.1 and the Consensus Assessments …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools