Please turn on your JavaScript for this page to function normally.
New non-profit CA aims to make HTTPS use universal

To become ubiquitous, encryption must be easy to set up and easy to use, and that’s why the Electronic Frontier Foundation (EFF), Mozilla, Cisco, Akamai, IdenTrust, and …

Malware Domain Generating Algorithms are becoming more sophisticated

Malware cut off from its C&C servers is effectively useless to its masters, so they are continually trying to find new ways of maintaining that connection at all times. …

320 breaches reported between July and September

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial …

Overwhelming optimism for information security in 2015

Expectations for data security next year are surprisingly optimistic given the harsh reality of 2014, which has been the worst year on record for data breaches, according to a …

DDoS attacks continue to fall in size and frequency

The newest up-and-coming countries of origin for DDoS attacks will be Vietnam, India and Indonesia in 2015, according to Black Lotus. While these countries don’t have …

One billion attacks were blocked during the third quarter

Over a billion malicious attacks were detected and blocked during the third quarter, according to Kaspersky Lab. One third of Web attacks were carried out using malicious Web …

Whitepaper: CISOs secret weapon for reducing enterprise risk

Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …

Open Whisper Systems helps WhatsApp achieve end-to-end encryption

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …

Cisco open sources Big Data security analytics framework

“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …

Critical factors in preventing data breaches

McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …

Michaels and Staples breaches carried out by same attackers?

The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …

One-in-four have been victims of identity theft

Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools