Please turn on your JavaScript for this page to function normally.
password
Why we need a reality check on passwords

Given all the recent and historical news on data breaches of personal e-mail accounts, social media accounts and even phone account passwords, it is every wonder therefore …

money
Organizations are spending ineffectively to prevent data breaches

A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Cloud
Security to become primary reason government agencies move to the cloud

Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

airplane
Cyber fraudsters steal over $50 million from airplane systems manufacturer

Austrian company FACC, which develops and produces components and systems made of composite materials for aircraft and aircraft engine manufacturers such as Boeing and Airbus, …

Facebook scam
Fake Facebook emails deliver malware masquerading as audio message

A new spam campaign is targeting Facebook users. It uses the same approach as the recent one aimed at WhatsApp users, and Comodo researchers believe that the authors of both …

Windows
Old, unpatched flaws exploited to achieve control of Windows systems, networks

Foxglove Security researcher Stephen Breen has demonstrated that you don’t need to exploit a 0-day or even a recently discovered vulnerability to gain the highest level …

Symantec scam
Authorized Symantec reseller scams users into buying security software

Malwarebytes researchers have discovered a new tech support scam that, unlike most, is being perpetrated by an active member of the Symantec Partner Program. Users are being …

Android Marshmallow
Asacub Android Trojan: Financial fraud and information stealing

Asacub is a new malware that targets Android users for financial gain. When first identified, Asacub displayed all the signs of an information stealing malware; however, some …

shadow
Exposing the shadow data threat

Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

escalator
How well protected is NHS data?

A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …

Tux
0-day in Linux kernel endangers Linux servers, Android devices

A serious and pretty longstanding flaw in the Linux kernel has been recently discovered by researchers from infosec outfit Perception Point. The vulnerability (CVE-2016-0728) …

Apple
Apple kills 28 flaws in OS X, iOS and QuickTime

If you use Apple’s OS X El Capitan, iOS and QuickTime on any of your computers and devices, you might want to implement the latest updates pushed out on Tuesday. OS X El …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools