Please turn on your JavaScript for this page to function normally.
healthcare
Healthcare industry has an alarming mobile security gap

The healthcare industry is massively adopting smart mobile devices, but still moves very slowly when it comes to implementing cyber security measures to protect those devices. …

Mossack Fonseca
Panama Papers breach was the result of lax security practices?

News items based on the so-called “Panama Papers,” a set of 11.5 million documents leaked from the networks of Panama-based law firm Mossack Fonseca, keep popping …

Magnify
Who owns corporate data? Employees think they can just take it

A third of all employees believe they own – or share ownership of – the corporate data they work on, with half thinking they can take the data with them when they …

ThreatQ
Centrally manage all of your intelligence data with ThreatQ

In this podcast recorded at RSA Conference 2016, Chris Jacob, Global Director of Threat Intelligence Engineers at ThreatQuotient, introduces the ThreatQ threat intelligence …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

Hacking Team
Hacking Team’s global export license revoked

The Italian Ministry of Economical Progress (Il Ministero dello Sviluppo Economico – MISE) has revoked Hacking Team’s licence to export their Galileo remote …

Broken glass
Researchers release PoC exploit for broken IBM Java patch

Polish firm Security Explorations has had enough of broken patches for security vulnerabilities it has reported to vendors. On Monday, the company’s CEO Adam Gowdiak has …

WhatsApp encryption
WhatsApp implements end-to-end encryption by default

Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …

Bug
Microsoft plugs online services account hijacking vulnerability

London-based security researcher and bug hunter Jack Whitton has discovered a serious cross-site request forgery flaw affecting Microsoft’s authentication system for …

explode
eBook: Guide to protecting SaaS apps from DDoS attacks

With a business model dependent on 100% uptime for their online customers, the last thing SaaS companies can afford is a DDoS attack. Read this DDoS eBook from Incapsula and …

server
The state of the cloud and the Software-Defined Data Center

We’ve long been moving toward cloud-based and virtualized infrastructures, but in some ways 2016 might just be the year in which the Software-Defined Data Center (SDDC) really …

Vivaldi
Opera Software founder launches Vivaldi, a new browser

After more than one year in public development and millions of downloads, Vivaldi today released the first major release of its desktop browser: Vivaldi 1.0. The UI uses React …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools