Please turn on your JavaScript for this page to function normally.
Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles:(IN)SECURE Magazine issue 47 released(IN)SECURE Magazine is a free digital …

Data security for the borderless enterprise

With the advent of cloud computing, social media and mobility, data is moving and proliferating at pace across borders, platforms and applications, very rarely staying within …

Information security: A key issue in the 2016 U.S. presidential campaign?

As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 …

State-sponsored cyberattacks linked to Russian intelligence gathering

F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …

Top cloud security issue? Lack of visibility

Lack of visibility into cloud deployments and associated provider security practices and controls is a source of major dissatisfaction amongst IT professionals, according to …

Big Data investments on the rise

Investment in big data continues to increase in 2015, but not as rapidly as in previous years. More than three-quarters of companies are investing or planning to invest in big …

80% increase of malware on Windows devices

“Alcatel-Lucent estimates that 80 percent of malware infections detected on mobile networks during the first half of 2015 have been traced to Windows-based computers. …

Malware takes screenshots of the infected players virtual poker hand

“Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of …

(IN)SECURE Magazine issue 47 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 47 has been released today.Table of contents: …

Container security concerns escalate

86% of IT decision makers say their companies already deploy containers, or they plan to do so within a year, according to Twistlock. Of these, 35% said containers are already …

Why background screening is vital for IT security

Which security controls are the most important in thwarting cyber crime against businesses? Anti-malware? Physical security? According to a recent survey, people are a main …

230,000 new malware samples detected each day

“PandaLabs has confirmed a record increase in the creation of new malware samples. In the second quarter of 2015 alone there were an average of 230,000 new malware …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools