Please turn on your JavaScript for this page to function normally.
Week in review: Rise of automation, Google hacking, and Symantec reseller turns to scamming

Here’s an overview of some of last week’s most interesting news, reviews and articles: “Deliberately hidden” backdoor found on US government’s …

password
Why we need a reality check on passwords

Given all the recent and historical news on data breaches of personal e-mail accounts, social media accounts and even phone account passwords, it is every wonder therefore …

money
Organizations are spending ineffectively to prevent data breaches

A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Cloud
Security to become primary reason government agencies move to the cloud

Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

Android Marshmallow
Asacub Android Trojan: Financial fraud and information stealing

Asacub is a new malware that targets Android users for financial gain. When first identified, Asacub displayed all the signs of an information stealing malware; however, some …

shadow
Exposing the shadow data threat

Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

escalator
How well protected is NHS data?

A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …

Oracle
Oracle fixes 248 vulnerabilities in January patch update

Oracle has published their Critical Patch Update (CPU) for January 2016. The Oracle CPU is quarterly and addresses the flaws in large Oracle’s product line, including their …

flames
Industrialized attackers systematically destroy defender confidence

Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …

robot
Rise of automation: Battle of the bots

As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

lock
Businesses fail to take full advantage of encryption technology

Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …

Doctor
Cybersecurity recommendations for medical device manufacturers

Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools