Please turn on your JavaScript for this page to function normally.
Why enterprise security priorities don’t address the most serious threats

In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence …

Global action takes down Darkode cybercriminal forum

This week, law enforcement and judicial authorities worldwide have taken down the most prolific English-speaking cybercriminal forum to date: Darkode.In an international …

SanDisk unveils new wireless flash drive

SanDisk unveiled a new wireless mobile flash drive, the SanDisk Connect Wireless Stick, which enables sharing, transferring and accessing data between mobile devices and …

Coalition for Responsible Cybersecurity fights proposed export control regulations

A broad cross-section of industry announced the formation of the Coalition for Responsible Cybersecurity. The purpose of the Coalition is to prevent the Commerce Department …

Employees embrace BYOD, but still worry about privacy

The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …

Unsharing in the sharing economy

It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …

TeslaCrypt 2.0 makes it impossible to decrypt affected files

“Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting …

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach

After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …

The difficult task of meeting compliance needs

Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …

3 ways to stop insider threats in your organization

No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …

Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools

Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools