Privacy, security most likely to drive consumer action
According to a new study by Edelman, among major technology policy issues, security and privacy of personal data was overwhelmingly the largest concern for consumers, ranking …
Geospatial framework for cybersecurity
Esri is joining forces with RedSeal in order to create a geospatial framework for cybersecurity. The goal is to fully integrate existing cybersecurity and IT data with other …
Hacker nets over $600k by compromising NAS systems to mine Dogecoin
A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …
SMBs still use Windows XP and face security risks
Almost one in five small and medium businesses worldwide are currently exposed to major security risks as they are still using Windows XP after Microsoft ended support for the …
There’s a new banking Trojan in town
A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …
Employees take too many risks with Wi-Fi security
UK employees are potentially putting their companies at risk of cyber-attack when using mobile devices for work purposes while on holiday or on a short break, new research has …
Java program to reverse Android ransomware damage
University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …
Could you maintain security in event of IT failure?
A study investigating the priorities for the UK and Ireland’s top banks and insurance companies has revealed low confidence in the ability to remain secure in the event …
DEF CON contest to help track down illegal robocalls
The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …
Financial ransomware now targeting U.S. users
Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …
Service providers need different core competencies in a digital world
Organizations’ emerging transformation to digital business models is driving the need for greater IT agility to meet changing business strategies and requirements in a …
Analysis of 3000 vulnerabilities in SAP
According to official information from SAP portal, more than 3000 vulnerabilities have been closed by SAP. Here are 6 highlights from a research conducted by the ERPScan team …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous