Please turn on your JavaScript for this page to function normally.
world biohazard
Crypto-ransomware attacks hit over 700,000 users in one year

Kaspersky Lab found a drastic increase in encryption ransomware attacks, with 718,536 users hit between April 2015 and March 2016. This is an increase of 5.5 times compared to …

ISO
Overcoming the barriers to ISO 27001 adoption for success on G-Cloud

A recent attention grabbing headline that was just too controversial to ignore: “Sloppy SaaS firms lose out on G-Cloud deals, research suggests”. In the article, …

biohazard
Godless Android malware offers serious firepower to a botnet herder

One of the most concerning characteristics of the Godless malware is the ability to receive remote instructions on which app to download and install on mobile devices, without …

Globe
IoT threats drive global embedded security shipments

With the rise of IoT, pressure to mitigate cyber risks in connected devices is mounting. Though security is a big concern, connected devices from autonomous vehicles to smart …

pulse
Why are hackers increasingly targeting the healthcare industry?

Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the …

Microsoft Wallet
Microsoft Wallet enters the mobile payments fray: Is the industry secure?

The launch of Microsoft Wallet for Windows 10 users this week marks the latest entry from a major OEM into an increasingly booming mobile payments market. The new offering is …

(IN)SECURE Magazine 50
(IN)SECURE Magazine issue 50 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 50 has been released today. Table of contents …

cloud
Cloud-first is replacing the defensive no-cloud stance

By 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is …

Drone
FAA finalizes operational rules for drones

The Department of Transportation’s Federal Aviation Administration has finalized the first operational rules for routine commercial use of small unmanned aircraft systems (UAS …

cloud computing
Where does your cloud data live? 3 questions to ask

There’s a common thread behind every security pro’s cloud-related fears: control. Whether your company’s infrastructure revolves around a cloud-centric strategy or regulates …

ransomware
Most businesses would not pay in the event of a ransomware attack

Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of a …

Rule 41
Changes to Rule 41 will increase law enforcement hacking, surveillance

The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools