Please turn on your JavaScript for this page to function normally.
Travelers targeted by infected travel websites

Proofpoint security researchers recently were the first to discover that a large number of travel destination websites had been compromised and were being used to deliver the …

Why IAM will be worth over $10 billion by 2018

Enterprises are increasing their investment in Identity and Access Management (IAM) solutions. According to research firm MarketsandMarkets, the IAM Market is expected to grow …

Security weakness found in WiFi enabled LED light bulb

Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a …

Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT

Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …

Microsoft to address six issues on Tuesday

Microsoft has dropped their July 2014 advance security notification and it looks like a relatively light month of patching. Six issues in total, 2 Critical, 3 Important, 1 …

Connecting cloud storage services and cloud-based data loss prevention

CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new …

Spammers are always thinking up new tricks

The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …

Microsoft supports open source software framework for IoT

The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group’s multi-company effort as a Premier Member …

Live open source security lab coming to Cyber Security EXPO

Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …

Exploit switches off Microsoft EMET’s protection features

By leveraging and modifying a “semi-random public exploit” researchers have managed to deactivate all protection features of the latest version of …

Physical location of data will become increasingly irrelevant

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical …

Facebook SDK flaw allows unauthorized access to Facebook accounts

MetaIntell has uncovered a significant security vulnerability in the Facebook SDK (V3.15.0) for both iOS and Android. Dubbed Social Login Session Hijacking, when exploited …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools