Please turn on your JavaScript for this page to function normally.
Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Tips for safe online shopping

Veracode released a new infographic, “Identity Theft: Staying Safe in an Online World,” that provides practical tips for keeping personal information safe when …

The right to be forgotten: Between expectations and practice

The right to be forgotten is one of the elements of the new proposed regulation on data protection of the European Commission. The right allows people to ask for digitally …

Google Chrome App grabs identities, forges blogs in victims’ name to promote scam

A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …

Video: Incident response and cloud computing

Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …

81% don’t trust cloud security

81 percent of IT professionals express security concerns when moving data to the cloud, according to a recent survey by GreenSQL. The survey focused on one question: …

Blackhole exploits lead a black month for malware

In October, GFI Software threat researchers uncovered a large number of Blackhole exploits disguised as Windows licenses (just prior to the release of Windows 8), Facebook …

How teens hide their online activity

A European survey commissioned by McAfee has revealed an alarming disconnect between what teens are getting up to online, and what parents are aware of. Many UK teens are …

Generation Tech: Gifted but a long way from bad

They have been described as technology’s Generation Y or Generation Tech: an undisciplined, impulsive, entitled horde of twenty-something workers, seen as one of the …

Half of business information resides outside the firewall

Symantec launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. There are benefits …

ForgeRock launches open source stack to secure applications and services

ForgeRock announced availability of an open source stack to secure applications and services across enterprise, cloud, social and mobile environments. With more than 250K …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools