Please turn on your JavaScript for this page to function normally.
Inside corporate privacy programs at Fortune 1000 companies

The International Association of Privacy Professionals (IAPP) released a survey of corporate privacy programs at Fortune 1000 companies. The survey found that while corporate …

What attackers do after bypassing perimeter defenses

Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass …

Unsurprisingly, most believe their personal data is not secure

Confronted with new breaches reported in the media every week, nearly two out of three Americans (61% believe their personal data is not secure, according to PKWARE. Theft of …

New technique makes phishing sites easier to create, more difficult to spot

Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form. …

Linksys SOHO router owners urged to patch multiple vulnerabilities

Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of …

Which messaging technologies are actually secure?

The Electronic Frontier Foundation has evaluated 39 chat clients, text messaging apps, email apps, and technologies for voice and video calls, and found that only six of them …

Using security, cloud and Big Data to drive success

Dell surveyed more than 2,000 global organizations and found that security is the biggest concern in adopting cloud, mobility and Big Data. While 97 percent of organizations …

Backoff PoS malware becomes stealthier, more difficult to analyze

The Backoff Point-of-Sale RAM scraper malware has become even more difficult to detect and analyze, warns Fortinet researcher Hong Kei Chan. Even after the US DHS and US CERT …

Mobile security breaches impacted 68% of organizations

Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …

Security issues in collaboration platforms

CipherPoint revealed the results of its second annual survey on security issues in collaboration platforms such as Microsoft SharePoint, Office 365, and Google Apps. …

Free webinar: The basics of risk assessment and treatment according to ISO 27001

Register for this webinar to learn: The purpose of risk management Risk identification – assets, threats and vulnerabilities Risk analysis – how to assess impact …

Google open sources nogotofail, a network traffic security testing tool

In their quest to make users, the Internet, and digital devices in general more secure, a number of big Internet companies have recently announced a new collaboration that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools