Please turn on your JavaScript for this page to function normally.
The value of Bring Your Own Identity

New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …

Russian government offers money for Tor-cracking tech

The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can …

What influences corporate security strategies?

Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …

A peek into Police Locker’s distribution infrastructure

An analysis of the distribution infrastructure for the bothersome Android “Police Locker” ransomware has revealed that the attackers behind it are not putting all …

What is the primary driver for data lakes?

The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner. Several vendors are marketing data lakes as …

Almost 1 in 10 Android apps are now malware

Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses, …

Week in review: Tails 0-days, iOS backdoors, and the psychology of phishing

Here’s an overview of some of last week’s most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The …

Google and EU debate on implementation of “right to be forgotten”

It is, by now, widely known that European users can ask Google to “forget” sites with content these users find damaging to their reputation, but the European Court …

Fake GoogleBots are third most common DDoS attacker

An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting to web operators and SEO …

New type of ransomware bucks established trends

Ransomware is now one of the fastest growing classes of malicious software, says Kaspersky Lab researcher Fedor Sinitsyn. This should not comes as a surprise, when we know …

Open source responsible disclosure framework released

Bugcrowd, known for crowdsourced security testing, publicly released a new guide for companies looking to set up their own responsible disclosure programs. Developed in …

Is private cloud holding Feds back?

The Federal Government could save $18.9 billion annually by migrating services and applications to the cloud, according to MeriTalk and AT&T. The survey also found that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools