Please turn on your JavaScript for this page to function normally.
Safeguarding data in the healthcare industry

Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …

Point-and-shoot weapon stops drones without destroying them

Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …

How boards calibrate strategy and risk

Corporate boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the company, according to a recent global survey …

Cyber liability insurance is becoming an increasing necessity

According to Ken Westin, senior security analyst at Tripwire, cyber liability insurance is becoming an increasing necessity for businesses and could easily become a …

Data dump points to a breach at Electronic Arts

Account details of some 600 Electronic Arts (EA) customers have apparently been leaked on Pastebin. The company has yet to confirm whether the leak is genuine. “At this …

Exposing the most dangerous financial malware threats

Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …

Exposing the most dangerous financial malware threats

“Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial …

Cyber warfare fears spur US Navy to teach celestial navigation again

After Sony was hacked and the stolen emails leaked, some US companies began urging workers to revert to using phone calls and face-to-face meetings for sensitive discussions. …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

USB Killer 2.0: A harmless-looking USB stick that destroys computers

Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …

Prices of stolen data on the Dark Web

Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online …

Existing security standards do not sufficiently address IoT

A lack of clarity and standards around Internet of Things (IoT) security is leading to a lack of confidence.According to the UK IT professionals surveyed by ISACA, 75 percent …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools