Can you correctly identify phishing emails?
An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …
CIOs are distracted by the business of keeping the lights on
75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …
Former employee claims cybersecurity firm extorted clients
Tiversa, a privately held cybersecurity company based in Pittsburgh, Pennsylvania, has been accused by a former employee of hacking and then trying to effectively extort money …
US Passport Agency contractor stole applicants’ data to steal their identities
Three women from Houston, Texas, stand accused of engaging in an identity theft scheme in which one of them, a contract employee of the Department of State Passport Agency, …
Cyber extortionists are hitting hedge funds
Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund …
Man charged with attempted spear-phishing attack on U.S. Department of Energy
An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …
Why WinSCP became an open source classic
If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …
Increasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …
Angler EK pushes unnamed ransomware
“Malware distribution campaigns based using the popular Angler exploit kit continue delivering different types of ransomware. Last week, it was AlphaCrypt, which …
Tor Cloud project reaches the end of the line
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
Featured news
Resources
Don't miss
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)