Please turn on your JavaScript for this page to function normally.
Black Friday and Cyber Monday will put retailers under pressure

Retailers are currently preparing themselves for two very busy shopping days. Black Friday (28th November 2014) and Cyber Monday (1st December 2014) will see shoppers spend …

Fighting malware, emerging threats and AI

Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …

ENISA guidelines on cryptographic solutions

ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …

Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption

Here’s an overview of some of last week’s most interesting news and articles: The evolution of threat detection and Big Data Mark Gazit is the CEO of ThetaRay, a …

Millions of WordPress websites in danger due to easily exploitable bug

A new WordPress version has been released, and you better update to it, as it patches a critical cross-site scripting flaw that can be exploited by attackers to compromise …

Hikvision DVRs sporting bugs that allow device hijacking

A while back, SANS ISC CTO Johannes Ullrich discovered that cybercrooks were targeting Hikvision Digital Video Recorders (DVRs) in order to infect them with bitcoin-mining …

Examining 1 billion transactions for fraud

ThreatMetrix analyzed nearly one billion transactions and is able to provide a representative summary of activity including account creation, payment and login fraud across …

Users of Remote Access Trojans arrested in Europe

Europol and several law enforcement and judicial authorities carried out an action against EU citizens, mainly teenagers and young adults, who are suspected of using remote …

IE “Unicorn” bug actively exploited in the wild

Last week, in its regular Patch Tuesday, Microsoft patched a number of serious vulnerabilities, including one that is nearly two decades old, dating back to Microsoft IE 3.0. …

ITIL and ISO 20000 problem management

Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …

Using company devices for personal activities leads to data loss

GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that …

6 tips for protecting your Internet-connected devices

While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools