
52% of enterprises choose cloud as the platform of choice
Adoption reality finally measures up to hype for cloud computing. There are game-changing consequences for IT departments as DevOps’ influence extends across the enterprise, …

LogiLube to offer ironclad security based on Waterfall’s Unidirectional Security Gateway
Waterfall Security Solutions nnounced a collaboration with LogiLube to protect LogiLube’s customers’ industrial sites from online cyber attacks. By deploying Waterfall’s …

Week in review: IoT, Windows code injection, new user privacy rules for ISPs
Here’s an overview of some of last week’s most interesting news, reviews and articles: New code injection attack works on all Windows versions Researchers from …

Australian blood donors’ info found leaking from insecure server
Personal information of some 550,000 Australian blood donors has been sitting exposed on a web developer’s server and has been downloaded by a person who effectively …

New code injection attack works on all Windows versions
Researchers from security outfit enSilo have uncovered a new code injection technique that can be leveraged against all Windows versions without triggering current security …

Nearly half of consumers have been cybercrime victims
45% of consumers have been a victim of some form of cybercrime — with 65% choosing not to report the incident to authorities. Research also found that one in six of these …

Phishers are impersonating major UK banks on Twitter
Customers of UK banks are being targeted by phishers impersonating the banks’ customer support account on Twitter, Proofpoint warns. The phishers usually choose a …

Photos: IoT Solutions World Congress Barcelona 2016
This week, the world’s leading industrial Internet companies and experts gathered at the Fira de Barcelona for the IoT Solutions World Congress (IoTSWC) in order to showcase …

Rise in cloud adoption, confusion about managing complex cloud environments
Today’s enterprises are increasingly moving to the cloud to transform internal IT environments, but are struggling to manage the complexity, according to 451 Research and …

Smart city initiatives: Highly integrated and complex problems to solve
Every day, leaders of large cities grapple with knotty, complex problems like decaying public transportation infrastructures, aging utility lines, urban blight, neighborhoods …

New FCC privacy rules protect broadband users
The Federal Communications Commission today adopted rules that require broadband ISPs to protect the privacy of their customers. The rules ensure broadband customers have …

Icarus takes control of drones by impersonating their operators
Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …
Featured news
Resources
Don't miss
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
- Product showcase: Go beyond VPNs and Tor with NymVPN
- CISOs must speak business to earn executive trust