Please turn on your JavaScript for this page to function normally.
Never underestimate the impact of a data breach

The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …

Popular VPNs leak data, don’t offer promised privacy and anonymity

Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe …

How to raise users’ expectations about security and privacy?

Users do not seem to care much about privacy and security. When buying a new smartphone, for example, they rarely ask about security updates and how long the device will be …

Google releases new hub for managing security and privacy settings

Google has released a new privacy tool for users: the My Account centralized hub for managing Google Settings.“Privacy and security are two sides of the same coin: if …

Researchers mount cyber attacks against surgery robot

A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely …

Misconfigured DNS servers may leak domain info, warns US-CERT

US-CERT is urging administrators of Domain Name System servers to check whether their machines are misconfigured to respond to global Asynchronous Transfer Full Range (AXFR) …

How to keep your Facebook account secure

When last November Facebook asked users to comment the proposed changes to the social network’s terms of use, data policy, and cookies policy, it also introduced Privacy …

Build A Security Culture
Review: Build A Security Culture

Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded …

Polymorphic security warnings more effective than same, static ones

In the last year or so, we have witnessed Google becoming increasingly interested in providing effective warnings that would spur users into making good decisions regarding …

US air traffic control system is riddled with vulnerabilities

A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …

IT security training is a top priority for CIOs

CIOs are taking a multipronged approach to protecting sensitive company information, and the majority are currently taking or planning to take steps in the next 12 months to …

Browser security warning redesigned with partial success

How to make users understand a browser’s SSL warning, and make them choose the link that will lead them away from a site that has been deemed unsafe for use? A group of …

Don't miss

Cybersecurity news