The worst data disasters from 2015
What’s stronger than a speeding locomotive and can survive the heat of a fire? Data. The device that contains that data is a different story. Each year, Kroll Ontrack – which …
Mass adoption of mobile payment services derailed by security, privacy concerns
Evaluating the mobile payment preferences of 1,217 consumers from the U.S., a new Research Now survey revealed that 17 percent of respondents who did not make holiday …
Mobile users continue to put personal and corporate data at risk
Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …
The future of information security in the government
A new report from Intel Security and the Digital Government Security Forum (DGSF) looks at the fast changing digital world, which promises to transform how our government and …
A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?
The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …
Inside the largely unexplored world of mainframe security
The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …
Cracks in the mobile ecosystem, Internet-connected devices
The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …
Exploit kit activity up 75 percent
The creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in the third quarter of 2015 from the same period in 2014, according to …
Microsoft’s new security posture leads to baked-in security
More than ever, Microsoft wants its products to be the first choice for enterprises, organizations, and governments. And to do that, they embedded security in the …
Guidelines for smart city technology adoption
Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, released guidelines jointly developed by Securing Smart …
Will 2016 mark the end of the Advanced Persistent Threat?
Advanced Persistent Threats (APTs) as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to detect and trace back to the …
Anonymous goes after ISIS, aims to expose recruiters and sympathizers
On Friday, the 13th of November, a slew of coordinated attacks executed by ISIS terrorists in Paris has resulted in the death of over 120 people in cafes, restaurants, a …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks