Please turn on your JavaScript for this page to function normally.
Chinese hackers infiltrated US Chamber of Commerce

The computer systems of the US Chamber of Commerce, a lobbying group that represents the interest of US businesses and trade organizations, have been infiltrated by hackers. …

Visa probes into potential card processor security breach

Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …

Key security threats in the coming year

The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …

GlobalSign reports CA infrastructure wasn’t compromised

When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …

The rise of social media abuse and mobile malware

IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …

12 hacking groups are behind most Chinese cyber attacks

Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

2012 network security trends

Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …

Proactive detection of cyber security incidents

ENISA today launched a report which identifies 16 shortcomings in detection of network security incidents. The report reveals that not all available tools are used widely …

Fraudsters beat two-factor authentication, steal $45k

It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …

U.S. wakes up to cybercrime threat

Businesses in the U.S. are increasingly waking up to the threat of cyber crime according to the latest Lloyd’s Risk Index, but evidence shows the problem of cyber crime …

Three actions to protect patient data

The second annual benchmark study by Ponemon Institute finds that the frequency of data breaches in healthcare organizations surveyed has increased by 32 percent, with …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools