Please turn on your JavaScript for this page to function normally.
The leading cause of insider threats? Employee negligence

Employee negligence, which may be caused by multitasking and working long hours, can result in insider threats and cost companies millions of dollars each year. It can cost a …

The rapid growth of the bug bounty economy

On average, nearly five high-to-critical priority vulnerabilities are found within the lifetime of a single program, according to Bugcrowd.Another observed trend includes the …

Cyber insurance market to hit US$10 billion by 2020

Continued and sustained cyberattacks are having a ruinous effect on enterprises and driving up the cost of incident response. With over 900 million reported records exposed in …

Week in review: Windows 10 security features, and thwarting user profiling based on typing behavior

Here’s an overview of some of last week’s most interesting news and articles:Over 5,000 mobile apps found performing in-app ad fraudOf the $20 billion projected to …

Fake “Windows 10 Free Upgrade” emails deliver ransomware

“It didn’t take long for malware peddlers to take advantage of the huge interest users have shown into Windows 10. The newest version of the popular software was …

US will revise Wassenaar pact changes

US Commerce Department’s Bureau of Industry and Security (BIS) will rethink the Wassenaar pact changes regarding “cybersecurity items” that it proposed and made …

Microsoft Edge: New browser, new risks for Windows 10

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors …

Cybercriminals are preying on existing vulnerabilities to plan future attacks

Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …

Researchers devise passive attacks for identifying Tor hidden services

A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.Hidden services are …

List of approved Windows 10 compatible security products

Windows 10 is now available to users around the world, and it comes with new security features.AV-Comparatives tested a variety of software titles to see which of them are …

Cloud encryption and tokenization trends in financial services

The adoption of the cloud continues to grow rapidly with Gartner forecasting $282 billion in spending by 2018.“As financial services adopt the cloud, strict compliance …

Organizations on the hunt for DevOps, IoT and mobile skills

Red Hat released findings from its recent mobile survey revealing trends in enterprise mobility hiring priorities for 2015. According to the survey, 50 percent of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools