Please turn on your JavaScript for this page to function normally.
Smart meters vulnerable to false data injection

Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …

It’s official, corporate passwords are cheap

Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …

Sustained drop in spam levels

Industry and government efforts have dealt a significant blow to spam, according to a Commtouch report that is compiled based on an analysis of more than 10 billion …

SQL injection main database security concern among SMBs

GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …

Deconstructing local and remote file inclusion attack vectors

Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …

Targeted domain controller attacks increase 150%

Bit9 has seen a 150 percent increase in the number of attacks on domain controllers year-over-year. Attackers, largely nation states and cyber criminals, are targeting …

Widespread use of vulnerable open source components

Sonatype and Aspect Security collaborated on a study of the real-world use of vulnerable versions of open source libraries. Used by developers around the world, open source …

Exploiting legitimate online technology

Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …

Plan to reduce botnets launched

More than one in ten U.S. computers are infected by difficult-to-detect bots, which botmasters can use for anything from sending spam, to eavesdropping on network traffic, to …

Data breach vulnerabilities in the workplace

Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …

Top cause of data breaches? Negligent insiders

Negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types, according to the Ponemon Institute. The study also …

Surge in mobile exploits and shell command injection attacks

IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …

Don't miss

Cybersecurity news