Please turn on your JavaScript for this page to function normally.
HP identifies the sophistication of security attacks

HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …

How cybercriminals are infecting networks

Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …

What is the top target of cyber attacks?

Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according …

Zeus targets cloud payroll service to siphon money

With critical business services migrating to the cloud, service providers have become a prime target for cybercriminals. In the latest example of financial malware targeting …

Utah data breach numbers 750K+ victims

Social Security numbers of some 280,000 Medicaid and Children’s Health Insurance Plans users and “less sensitive” information on 500,000 more of them has …

Researchers link string of breaches to Chinese man

Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …

1.5 million cards compromised in Global Payments breach

A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …

Complex security architectures and innovation

Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, …

Cybercriminals increasingly target financial services industry

A report published this week by PricewaterhouseCoopers (PwC) has revealed that the financial services sector is the most common target of cybercriminals, with cybercrime …

Ghost in the Wires

Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …

Mousetrap Trojan steals money by chain reaction

Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …

Is Ukraine the perfect place for hackers?

What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …

Don't miss

Cybersecurity news