Please turn on your JavaScript for this page to function normally.
The global nature of advanced cyber attacks

FireEye released a report that provides insight into the global nature of malware communication activity related to sophisticated cyber attacks. “The threat landscape …

Is your company ready for a big data breach?

Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …

Analysis of 5 million scans on 53 million hosts

Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …

File protection in the cloud with DigitalQuick

Fasoo announced that its new data security solution, DigitalQuick, which allows consumers to keep sensitive information private when shared via email or through cloud storage …

Remote users expose companies to cybercrime

Results of new remote access security research show half of companies with a remote workforce had their websites compromised in 2012, over a third had passwords hacked, and …

Free Android mobile security app

Android is an increasingly popular target for malware and SMiShing (SMS phishing). To help combat this growing threat, Sophos has introduced the latest version of its free …

Data thieves and their motives

Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …

Wireless hack attacks target critical infrastructure

Critical infrastructure control systems are at risk from wireless attacks carried out over Software Defined Radio (SDR), according to Digital Assurance. Critical network …

Dangerous CSRF attacks up 132%

FireHost has announced today its Q1 2013 web application attack statistics, detailing the type and number of the most dangerous cyberattacks blocked by the firewalls that …

The importance of crowd-sourced threat intelligence

Imperva analyzed real-world attack traffic against 60 web applications between January and March 2013 to identify common attack patterns. Businesses can reduce the risk of …

SafeNet releases first crypto hypervisor

At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …

ForeScout and FireEye team for APT mitigation

ForeScout and FireEye announced an integrated approach to dynamically mitigate APTs and zero-day attacks. According to FireEye’s 2H2012 Advanced Threat Report, on …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools