Please turn on your JavaScript for this page to function normally.
Healthcare
Stolen medical information affects 18 out of 20 industries

Stolen medical information is a much more widespread issue than previously thought, affecting 18 out of 20 industries examined, according to the just released Verizon 2015 …

Euro
Mobile banking threats among the leading malicious financial programs

For the first time ever, mobile financial threats rank among the top ten malicious programs designed to steal money. Another alarming trend is the rapid spread of ransomware, …

binary
Five key cybersecurity trends for 2016

The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

Tux
Linux machines can be “owned” by hitting backspace 28 times

Taking over a Linux machine that has been locked with a password can be as easy as pressing the backspace key 28 times, two researchers from the Cyber Security Research Group …

Bug
XSS, SQLi bugs found in several Network Management Systems

Network Management System (NMS) offerings by Spiceworks, Ipswitch, Opsview and Castle Rock Computing have been found sporting several cross-site scripting and SQL injection …

Abstract
Vision for a new generation of experimental cybersecurity research

How do cybersecurity experts discover how to properly defend a system or build a network that’s secure? As in other domains of science, this process involves hypothesis, …

Laptop
IT teams expect a nightmare during the holidays

Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. Over one-third of IT professionals in …

Cloud lock
IT use of cloud surges to record heights

The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …

network cables
Will 2016 be the year of the 100G network?

100G Ethernet networks will be deployed much faster and more broadly than previously expected. Based on the influence of new paradigms currently emerging like SDN, NFV, Big …

Broken glass
Asian company is the newest APT threat

An unnamed South Asian software development consultancy that creates software for employee monitoring is also an APT player and, according to CloudSek CTO Rahul Sasi, it …

Broken glass
Critical RCE bug in FireEye’s security appliances exploitable via email

Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools