Please turn on your JavaScript for this page to function normally.
cloud binary
Public cloud services spending to reach $122.5 billion in 2017

Worldwide spending on public cloud services and infrastructure will reach $122.5 billion in 2017, an increase of 24.4% over 2016. Over the 2015-2020 forecast period, overall …

Eye
How IDF soldiers’ phones got turned into spying devices

For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …

IoT
The dangers that come with buying pre-owned IoT devices

When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you …

patching cloud
25% of healthcare organizations using public cloud do not encrypt data

A HyTrust survey of 51 healthcare and biotech organizations found that 25 percent of those organizations using the public cloud do not encrypt their data. The survey also …

Keyboard
CompTIA Cybersecurity Analyst certification to include behavioral analytics

CompTIA unveiled a vendor-neutral certification, CompTIA Cybersecurity Analyst (CSA+), that brings behavioral analytics to the forefront of assessing cyber threats. The …

talk speak speaker
Week in review: Self-healing malware, Patch Tuesday postponed, RSA Conference 2017

Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2017 coverage Check out what you missed at the infosec event of the …

biohazard
Magento-based online shops hit with self-healing malware

Administrators of e-commerce sites running on the open source platform Magento would do well to check their database for triggers with suspicious SQL code, warns Willem de …

eye
AI SaaS application for cyber attack detection

PatternEx announced the first Artificial Intelligence SaaS application for cyber attack detection at RSA Conference 2017. PatternEx’s flagship product, the PatternEx Threat …

professional
Half of IT pros lack confidence in their company’s cybersecurity strategies

Centrify asked IT professionals attending RSA Conference 2017 how their companies secure applications and infrastructure in the age of access, and their responses revealed …

car
Insecure car-controlling Android apps are a boon for car thieves

Being an expensive thing, a car requires an approach to security that is no less meticulous than that of a bank account. Yet, car manufacturers are infinitely more interested …

files
Data breaches becoming more complex, pervasive and damaging

Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves …

encryption data
Global geopolitical changes driving encryption adoption

Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools