Please turn on your JavaScript for this page to function normally.
Global action targeting Shylock malware

On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal …

US DOJ provides update on Gameover Zeus and Cryptolocker disruption

The US Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting …

Raspberry Pi B+ adds connectivity and power features

Launched today, the new Raspberry Pi B+ board, which marks the first significant change to the credit card-sized computer, is available immediately. Priced at $35, the new …

Week in review: Google catches India with fake certificates, and the risks of selling used smartphones

Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …

IoT privacy tech working group announced

TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the …

CryptoLocker is temporarily disabled, users still at risk

Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this …

Securing the virtual environment

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …

Empowered Millennials expect BYOD

New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well …

Businesses are deprioritizing information security

Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the …

Exploring the BYOD security dynamic

Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives. The initial survey, conducted in …

Consumers don’t trust any industry with their personal data

U.S. consumers have little faith that companies are able to keep their person data safe. The sentiment crosses nearly all industries with consumers saying that the lack of …

Nearly 70% of critical infrastructure providers suffered a breach

New research from Unisys finds alarming gaps in the security of the world’s critical infrastructure. Nearly 70 percent of companies surveyed that are responsible for the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools