
When it comes to cyber attack detection, IT pros are overconfident
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to …

IoT security guidelines for providers, vendors, and network operators
The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …

Rooting malware lurking in third party Android app stores
Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …

Critical bug found in Cisco ASA products, attackers are scanning for affected devices
Several Cisco Adaptive Security Appliance (ASA) products – appliances, firewalls, switches, routers, and security modules – have been found sporting a flaw that …

Exposing the Adwind RAT: One of the biggest malware platforms in existence today
At the end of 2015, Kaspersky Lab researchers became aware of an unusual malware program that had been discovered during an attempted targeted attack against a bank in …

Government sector: largest revenue contributor for the global cyber security market
The cyber security market is predicted to reach close to USD 161 billion in revenue by 2020, according to Technavio. “During the forecast period, the market share of North …

101,000 US taxpayers affected by automated attack on IRS app
The US Internal Revenue Service (IRS) has revealed more details about an attack it suffered last month, mounted by unknown individuals with the aim to file fraudulent tax …

Gmail to warn when email comms are not encrypted
From now on, Gmail users will be able to see whether their communications with other email account holders – whether Gmail or any other email service – is secured. …

Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise
A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …

Playing Hearthstone? Want to cheat? You might end up with Bitcoin-stealing malware
It’s widely known that online gamers make great targets for cyber criminals: their dedication and enthusiasm for the game(s) often leads them to disregard warnings both …

What’s the real cost of a security breach?
The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Network forensic analysis tool NetworkMiner 2.0 released
NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous