Please turn on your JavaScript for this page to function normally.
Week in review: Flash flaw exploited in the wild, spies DoSed Anonymous, and how a fake antivirus attack works

Here’s an overview of some of last week’s most interesting news and articles: A solution for fixing hijacked Chrome settings According to Linus Upson, Google VP of …

Mobility is the weakest security link

Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …

What do government security pros think?

Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …

Trends in web application security

Despite web application vendors being more responsive and releasing security patches much faster than in 2012, new research revealed that it is still taking an average of over …

Microsoft to keep next Patch Tuesday light

Microsoft continues the trend they started last month of keeping patch Tuesday relatively light. There are only five advisories this month – two critical, three …

99.4% of spam blocked in recent Virus Bulletin test

Virus Bulletin has announced the results of its latest anti-spam comparative review: all 18 solutions that were tested were found to block at least 99.4% of all spam – …

Adults admit logging into their partners social media accounts

New research reveals that one in four Brits will be sending a saucy message or photo to their other half. However, lovers might want to think twice before hitting send on …

Top ten points in the fight against cybercrime

At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …

Effective incident response

Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical – but among those needles are little threads of …

Every two seconds there’s a new victim of identity fraud

Javelin Strategy & Research reports an increase of more than 500,000 fraud victims to 13.1 million people in 2013. Account takeover fraud hit a new record in incidence …

How Edward Snowden’s actions impacted defense contractors

A new ThreatTrack Security study sheds light on the attitudes of a very exclusive group of IT and security managers – those employed by U.S. defense contractors – …

Insecure file sharing puts corporate data at risk

Personal email could be 2014’s biggest threat to corporate data. A new survey of more than 500 professionals by Globalscape found that in the past 12 months, 63 percent …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools