Please turn on your JavaScript for this page to function normally.
sign
Compliance compounded by evolving threat landscape

As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …

market
Cloud Identity and Access Management market to reach $2.8 billion by 2020

A new report by Allied Market Research projects that the global cloud IAM market would garner revenue of $2.8 billion by 2020, registering a CAGR of 26.2% during the forecast …

Smartwatch
Your smartwatch can give away your payment card’s PIN code

Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an …

Android
Android banking Trojan defeats voice call-based 2FA

Bankosy is a banking Trojan that has been targeting Android users for a while now, but has only recently been updated with a new capability of note: the ability to deceive …

Fortinet
Fortinet says backdoor found in FortiOS is “a management authentication issue”

Fortinet, the company whose enterprise network security offerings include the popular FortiGate firewall platform, has issued a statement regarding a security issue that has …

Microsoft Edge
Microsoft ends support for Windows 8, IE8 through 10: What does this mean for you?

Slowly but surely, Microsoft is pushing users towards Windows 10 and its new browser, Microsoft Edge. The way through this is by stop providing technical support and security …

jigsaw
Attackers use SQL injection to manipulate search engine rankings

Akamai has identified a sophisticated SEO campaign that uses SQL injection to attack targeted websites. Affected websites will distribute hidden HTML links that confuse search …

Frame
Most companies do nothing to protect their mobile apps

There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …

eye
Insider threat focus on the rise

The focus on insider threats will increase and corporations will begin to penalize employees who misinterpret security policies and procedures, according to a new survey of …

User key
Surge in endpoints drives need for security

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than …

vectors
The danger of terror attacks using drones, and possible countermeasures

You can add terrorist-controlled drones to the list of dangers we need to be scared about in the future, the Oxford Research Group announced after publishing the latest report …

Bug
Google researchers finds critical flaws in Trend Micro AV solution

If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools