Please turn on your JavaScript for this page to function normally.
Defending against drive-by downloads

In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …

Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …

Reactions to the Yahoo Mail hack

Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …

Global view of attack traffic and security

Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …

Why governance and policy can strengthen compliance efforts

A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …

10,000+ UK systems affected by ICEPOL Trojan ransomware

At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …

Check Point discovers critical vulnerability in MediaWiki

Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …

Risky online behaviour is putting teens in danger

Research by McAfee and the Anti-Bullying Alliance has found that 14-15 year old teenagers are most likely to adopt risk-taking behaviours and overshare online; putting …

Data mining the future with security predictions

It has become somewhat of a tradition for information security vendors to pull out their crystal balls at the end of each year and do their best to predict interesting …

Many Android apps can track your location, access photos

An alarming proportion of Android applications can find and open private photographs on smartphones, track users’ locations, divulge e-mail addresses over the internet …

SpyEye creator pleads guilty

Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …

Surge in mobile network infections affects millions of devices

Security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools