Please turn on your JavaScript for this page to function normally.
RSA Security Analytics leverages big data

RSA released RSA Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets …

Users trust the cloud with important data

New research from Rackspace shows that Brits may be trusting the cloud as never before with up to £24 billion worth of digital assets stored remotely. According to the …

Malware controls 620,000 phones, sends costly messages

A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has …

FBI arrests man accused of coercing women to expose themselves on Internet

A man accused of hacking into hundreds of Facebook, Skype and email accounts and extorting women into showing him their naked bodies was arrested today on federal computer …

SaaS mobile device, application and data management solution

AppSense released MobileNow, a SaaS based mobile device, application and data management solution designed for Enterprise and Mid-Market organizations that bridges …

How do you protect your phone and your data?

Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …

Practical steps to minimize data privacy threats

Google comes across 9,500 new malicious websites each day and responds by sending notifications to webmasters. Nevertheless, these websites are just one of the many dangers …

Oil and gas infrastructure cybersecurity spending to increase

As a highly critical sector, the oil and gas infrastructure should be one of the most secure, both physically and digitally. This is not the case. A multi-billion dollar …

The effectiveness of bug bounty programs

Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …

DDoS attack sizes plateau, complex multi-vector attacks on the rise

Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …

Trojan stole over 16,000 Facebook credentials

ESET discovered a social engineering Trojan horse that managed to steal the login credentials of more than 16,000 Facebook users. The ‘PokerAgent’ Trojan targeted …

Cross-site scripting attacks up 160%

Each quarter, FireHost reports on the Superfecta – a group of four cyberattacks that are the most dangerous – and warns that both Cross-Site Scripting and SQL …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools