Please turn on your JavaScript for this page to function normally.
danger
The dynamics of mobile app collusion and malicious activities

Mobile app collusion happens when cybercriminals manipulate two or more apps to orchestrate attacks on smartphone owners. McAfee Labs has observed such behavior across more …

pound
Businesses lost over £1 billion to online crime in the last year

With online crime becoming an increasing threat for businesses, new figures from Get Safe Online and Action Fraud show that from March 2015 – March 2016, a huge total of …

CloudLock
27% of cloud apps are high risk

As more and more organizations adopt cloud platforms, new shadow IT risk vectors are coming into play in the form of connected third-party apps, according to CloudLock …

magnify
Harnessing integrated security analytics

Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a …

road sign
Security startup confessions: Let’s talk about channel management

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

money
Symantec will acquire Blue Coat for $4.65 billion

Symantec will acquire Blue Coat for approximately $4.65 billion in cash. The transaction has been approved by the Boards of Directors of both companies and is expected to …

binary bomb
Thousands of websites exploited for illegal SEO tactics

Imperva researchers discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase SEO …

Binary
How IT teams are preparing for the rise of intelligent machines

A new survey carried out by analyst firm Freeform Dynamics examines the attitudes and readiness of IT decision makers with regard to intelligent machines and business systems …

general
Week in review: Mitsubishi Outlander hack, Mozilla funds open source code audits

Here’s an overview of some of last week’s most interesting news and articles: Researchers hack the Mitsubishi Outlander SUV, shut off alarm remotely Mitsubishi …

The future of intrusion detection

It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber …

eye
Hypervisor wiretap feature can leak data from the cloud

Bitdefender has discovered that encrypted communications can be decrypted in real-time using a technique that has virtually zero footprint and is invisible to anyone except …

email
Will your cyber insurance pay for email attacks?

If you’re relying on cyber insurance, check if your policies are up-to-date in covering new social engineering email attacks that are leaving firms at risk for taking …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools