Please turn on your JavaScript for this page to function normally.
The operations of a cyber arms dealer

FireEye researchers have linked eleven distinct APT cyber espionage campaigns previously believed to be unrelated, leading them to believe that there is a shared operation …

Apple-related phishing and online banking malware increase

As the holiday season approaches, Trend Micro is raising concern about the ongoing proliferation of Apple iOS phishing sites, as well as a sizable uptick in online banking …

Over 30 billion devices will be connected in 2020

With the digital world upon us, digitalization will significantly change the technology market through the Internet of Things, according to Gartner. While IT spending in …

The complexity of Android malware is increasing

259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …

Malware analysts regularly investigate undisclosed data breaches

ThreatTrack Security published a study that reveals mounting cybersecurity challenges within U.S. enterprises. Nearly 6 in 10 malware analysts reported they have investigated …

Fear of attacks leads to highly emotional decision making

Recent publicity about cyberattacks and data security breaches has increased IT risk awareness among CIOs, CISOs and senior business executives. However, Gartner’s 2013 …

Cybercriminals opting for real-time malware campaigns and phishing

The third quarter of 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites, according to Commtouch. The ever-growing exploitation of …

Cybercrime gangs seek victims in untapped markets

A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG. A total of 639 unique brands were targeted by phishing attacks in the …

Employees stuck with unauthorized file sharing services

Most employees (81%) access work documents on the go. Yet in the absence of an enterprise-grade file sharing alternative, 72% are resorting to unauthorized, free file-sharing …

Most visits to a login page are made by malicious tools

Incapsula surveyed 1,000 websites over a 90-day period, during which we recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins. Their data …

Most users don’t trust app developers with their data

Research by ISACA shows that, of 1,000 employed consumers surveyed in the UK, only 4% named the makers of their mobile phone apps as the entity they most trust with their …

Most organizations unafraid of phishing

ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools