Please turn on your JavaScript for this page to function normally.
Volvo
Volvo to launch a car without a physical key

Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …

Flashpoint dark web
Deep and Dark Web: Complexity and escalating cybercriminal activity

Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …

architecture
Coalition aims to educate policymakers on cybersecurity

A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …

PacketFence
PacketFence: Free and open source network access control

PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …

sign
Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …

market
IRS warns of 400 percent surge in tax-related phishing emails

The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …

Connect
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing

The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …

Android Marshmallow
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer

Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …

money china
IT spending to slow down in 2016

Worldwide IT spending is expected to post a major slowdown in 2016, as economic weakness in emerging markets and saturation of the smartphone market combine to result in a …

ransomware livechat
Ransomware offers customer support via chat

PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …

email
Email security still an afterthought

Email continues to be a critical technology in business and the threat of email hacks and data breaches loom large over IT security managers. Consequently, confidence and …

match fire
Application downtime costing enterprises $16 million each year

Despite numerous high-profile incidents in the last year, enterprises are still not paying enough attention to the needs of their users, according to Veeam. 84 percent of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools