Please turn on your JavaScript for this page to function normally.
Native Hadoop security tools are not enough

While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough …

The need for information security innovation

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity …

SSL Labs unveils free open source tool, new APIs

Qualys SSL Labs now includes free assessment APIs, accompanied by a free open source tool that can be used for bulk and automated testing of websites. These new enhancements …

A billion data records leaked in 2014

2014 was the year when “designer vulnerabilities” emerged, when breaches and security incidents were being announced so fast that we struggled to keep up, when old …

Search for vulnerable servers unearths weak, thousands-times repeated RSA keys

A group of researchers from the Information Security Group from Royal Holloway, University of London, wanted to see how many TLS servers still supported the weak, export-grade …

D-Link patches critical flaws in wireless range extender, Wi-Fi cameras firmware

D-Link has released new firmware for its DAP-1320 wireless range extender and the DCS-93xL family of Wi-Fi cameras in order to patch two critical vulnerabilities that can lead …

Deanonymizing Tor users with Raptor attacks

A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users. “There are essentially two ways for an adversary to …

Do smart machines require ethical programming?

Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well …

The Andromeda botnet is ballooning once again

Cybercriminals are, once again, trying to swell the number of computers compromised by the Andromeda backdoor. This will allow them to control the machines and download …

How Snowden’s revelations affected Americans’ communication habits and online activities

Nearly two years after news outlets started reporting on previously publicly unknown surveillance and data collection practices by the US NSA and its counterparts around the …

What pokes holes in virtual environments?

While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …

When it comes to cloud apps, companies are left in the dark

More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools