European banks and Europol join forces to fight cybercrime
The European Banking Federation (EBF) and Europol’s European Cybercrime Centre (EC3) signed a Memorandum of Understanding (MoU) which paves the way for intensifying …
McAfee delivers new security suites
McAfee released McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015 service that protects a customer’s …
Number of malicious eBay listings rises, accounts are hijacked
Pressure is mounting against eBay to quickly detect and remove bogus listings triggering cross-site scripting flaws to redirect users to phishing and other malicious pages. …
CipherShed: A replacement for TrueCrypt
Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …
Federal regulations on cyber security lead to revenue loss
Even though 87 percent those surveyed in the financial service industry agree that current regulatory changes are very important or critical to keeping their companies and …
Payment card info of 880k Viator customers compromised
Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday. The popular …
Home Depot security was anything but, say former employees
Bit by bit, information about the Home Depot security breach is coming to light, and the picture it paints is extremely unflattering for the retailer. The latest insight comes …
Every budget is now an IT budget
IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business …
Users trust mobile service providers more than employers
Privacy from employers is the top concern for employees being asked to use their own devices for work purposes, according to AdaptiveMobile. The research found that while over …
Week in review: Microsoft axes Trustworthy Computing Group, Apple’s new privacy policy, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: (IN)SECURE Magazine issue 43 released (IN)SECURE Magazine is a …
Microsoft kills off its Trustworthy Computing Group
Microsoft’s Trustworthy Computing Group is headed for the axe, and its responsibilities will be taken over either by the company’s Cloud & Enterprise Division …
Google will display Android devs’ physical address
Developers/publishers of paid Android apps and apps that feature in-app purchases will, by the start of next month, be required to add a physical contact address to their …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous