Please turn on your JavaScript for this page to function normally.
industrial
USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

open
Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns

The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturing sector is …

Australia
Hackers go after Australian ICT, managed services providers

The Australian Cyber Security Centre (ACSC), which integrates the national security cyber capabilities and serves as a hub for collaboration and information sharing with the …

Expected cyber threats over the next six months

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, …

fire
Rising information security threats, and what to do about them

The digital threat landscape faced by enterprises large and small is in perpetual flux, and keeping an eye on things and adapting defenses should be of primary importance to …

analytics IT assets
Logtrust debuts analytics solution for detecting threats in real-time

Logtrust announced at RSA Conference 2017 its Real-time Integrated Threat Analytics Solution Program. The program enables companies to build solutions that analyze the …

IoT
Security programs not keeping up with IoT threats

More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …

brain
Brainjacking: Hacking brain implants

Did you know that Dick Cheney, former US Vice President who held that office from 2001 to 2009, had the wireless telemetry on his implantable cardioverter-defibrillator …

Why VoIP security is crucial for organizations

With more organizations turning to VoIP (Voice over Internet Protocol) and cloud-based Unified Communications (UC) systems to underpin their commercial services and corporate …

danger
Businesses are unprepared for emerging threats

Organizations are failing to appreciate the growing challenges of protecting their data and, as a result, are experiencing the economic impact of data loss, according to EMC. …

binary
New threats will demand new approaches such as micro-segmentation and quantum encryption

Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …

warning scam
The 12 most dangerous online scams

Consumers would be wise to beware of the most common scams of the season before heading online to book travel and do holiday shopping. McAfee revealed the 12 most dangerous …

Don't miss

Cybersecurity news