Please turn on your JavaScript for this page to function normally.
Healthcare security spending to reach US$10 billion by 2020

The healthcare sector is ill-prepared for the new cyberage. Hospitals, clinics, trusts, and insurers are under attack from malicious online agents. The value of personal …

New DDoS attack and tools use Google Maps plugin as proxy

Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks. A known vulnerability in a Google Maps plugin for …

3 million strong RAMNIT botnet taken down

The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through …

Known weaknesses plague the security threat landscape

Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …

Addressing cybersecurity business disruption attacks

Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …

Internet of Things adoption is gaining momentum

Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …

Insider threats continue to dominate

Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …

Continuous Diagnostics and Mitigation capability requirements need re-prioritization

There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …

Mobile apps left vulnerable for months

McAfee Labs researchers found that mobile app providers have been slow to address the most basic SSL vulnerabilities: improper digital certificate chain validation. In …

How important is the critical information infrastructure?

ENISA issued methodologies for the identification of Critical Information Infrastructure (CII) services in communication networks. This study provides state of the art …

96% say ISO 27001 is important for improving security defenses

Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …

Is the Internet hiding a crime wave?

The U.S. crime rate continues to fall, according to the latest FBI’s release based on Uniform Crime Reporting from police departments, but researchers say those numbers, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools