Small business owners concerned EV charging stations ccould be hacked
As they increasingly add electric vehicles to their service fleets, small business owners worry about cybersecurity when connecting them to public charging stations, a HSB …
Merchants spent nearly €7 billion on fraud detection and prevention in 2021: Fraud itself costs less
CMSPI reveals European merchants spent nearly €7 billion on fraud detection and prevention in 2021, which is more than three times the value lost to fraud in the same year. …

77% of IT leaders are confident in their ability to prevent or mitigate a ransomware attack
ExtraHop’s report shows that however capable IT organizations have been in managing the dramatic transformations of the past couple of years, confidence still tends to …
Bad actors improving efforts to evade and fool both traditional and AI-based defenses
Deep Instinct Threat Research team monitored attack volumes and types to predict where the future of cybersecurity is heading, find out what motivates attackers, and to lay …

Video surveillance systems market to grow steadily by 2026
The video surveillance systems market is expected to grow at a CAGR of 10.06% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Commercial segment is to …

AI can alter geospatial data to create deepfake geography
A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …

Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

Laws, regulations and contracts that infosec pros should be familiar with
If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …

Tips for evolving your office’s security culture
Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …

Documentaries about an expert convicted of leaking classified information
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …

Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …

Imperfect algorithms threaten democracy
Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …
Featured news
Resources
Don't miss
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on
- DDoS attacks jump 358% compared to last year
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)