Please turn on your JavaScript for this page to function normally.
10 tips to avoid viruses on Halloween

As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …

Second teenager arrested in connection with TalkTalk hack

Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …

Real-world roadblocks to implementing CISA

The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …

China is the top target for DDoS reflection attacks

China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …

Online Trust Alliance releases new Internet of Things Trust Framework

The Online Trust Alliance (OTA) updated the IoT Trust Framework, a comprehensive global initiative that provides guidance for device manufacturers and developers to enhance …

CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom

Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to …

Most are unaware of the seriousness of medical data theft

Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

Creating a secure network for the Internet of Things

The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns …

New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers

Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.In a reflection DDoS …

Are IT security pros optimistic or naïve?

Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …

What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware

Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools