Please turn on your JavaScript for this page to function normally.
Company and employee disconnect on BYOD security policies

Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …

Stop all browser-borne malware from entering your network

In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about how malware has already done its job by the time …

AT&T hacker wants US govt to pay for the time he spent in prison

In an open letter addressed to members of the New Jersey District Court, FBI, and DOJ, Andrew “weev” Auernheimer is seeking monetary restitution for the time he …

eBay breached, change your password immediately

eBay has been hacked, and its customers are urged to change their account password as soon a possible. The attack, effected between late February and early March, resulted in …

Cybercrime attack targets, victims, motivations and methods

Trustwave experts gathered the data from 691 breach investigations (a 54 percent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned …

iBanking Android malware disguised as legitimate apps

On underground cybercrime markets, iBanking is a well-known piece of malware, and one of the most expensive ones, too. “iBanking often masquerades as legitimate social …

Some industrial systems still vulnerable to Heartbleed

The danger from Heartbleed has passed for most Internet users, but operators of Industrial Control Systems (ICS) are not that lucky. The US ICS CERT has issued on Tuesday an …

Insider threat and privileged user abuse

Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …

Facebook offers free browser-based malware scanner

People share via social media more than any other channel. But with social media exploits of personal and corporate accounts frequently making headlines, it’s time for …

Legacy cybersecurity products failed to protect 97% of organizations

A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to March 2014. Offering a unique glimpse …

Most compliance officers play little role in cyber security

Seventy-five percent of compliance officers are not involved in managing cyber security risk according to a report from Kroll and Compliance Week. In a survey of senior-level …

Free privacy and security scans with McAfee Mobile Security

McAfee announced the latest version of McAfee Mobile Security that now enables consumers to run free privacy and security scans. These scans allow users to identify apps that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools