Increasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …
Angler EK pushes unnamed ransomware
“Malware distribution campaigns based using the popular Angler exploit kit continue delivering different types of ransomware. Last week, it was AlphaCrypt, which …
Tor Cloud project reaches the end of the line
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
Data privacy endangered by international trade agreements
You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …
Breaking Bad-themed ransomware targeting users
“A new type of ransomware is targeting Australian users, and its creators have decided to have some fun and express their love for the popular US TV show Breaking Bad …
Court declares NSA’s domestic phone metadata collection program illegal
It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …
To what extent companies digitally track our daily lives?
Do you know how digitally collected information uncovers things about you which you would rather remained private? We’re already living in the age of Big Data, and are …
BalaBit updates Shell Control Box
BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …
Risk IT and services spending to reach $78.6 Billion in 2015
According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …