Please turn on your JavaScript for this page to function normally.
Top six security threats for 2014

The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …

90,000 patients’ info exposed in hospital malware attack

Personal information of some 90,000 patients of two Seattle hospitals has been compromised after an employee opened an email attachment that contained malware. The incident …

Can we expect a cyberwar resurgence?

Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …

F-Secure launches KEY, a secure password manager

F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …

Facebook “flaw” discloses users’ private friends list

A recently unearthed potential Facebook security vulnerability can turn out to be a boon for stalkers or social engineers trying to get their friendship request accepted by a …

Do large companies follow encryption best practices?

Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …

Lavabit founder submits final arguments in potentially game-changing privacy case

The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …

The enemy within

Recent high-profile cases in the press have called attention to the threat the trusted insider can pose to the security of an organization. A recent survey highlighted that …

Google settles Safari user tracking case, will pay $17 million

A settlement has been reached to end the lawsuit filed by 37 US states and the District of Columbia against Google because the Internet giant has been found bypassing …

Travelers are exposing their data on public networks

While aware of the risks, U.S. travelers are not taking the necessary steps to protect themselves on public Wi-Fi and are exposing their data and personal information to cyber …

Compromised Adobe accounts include military and government users

The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email …

UK consumers demand to be told of all data breaches

The UK public wants to be informed whenever an organization suffers a data breach, and that more needs to be done to punish companies that lose sensitive information, …

Don't miss

Cybersecurity news