Please turn on your JavaScript for this page to function normally.
Siesta cyber espionage campaign targets many industries

Trend Micro researchers have uncovered yet another cyber espionage campaign targeting a wide variety of industries including energy, finance, security and defense, and …

Using free Wi-Fi in Europe is risky

Internet users would do well to be extra careful when attempting to use public Wi-Fi hotspots in Europe, as hackers and cyber crooks have lately ramped up their efforts to …

SolarWinds enhances its Network Performance Monitor

SolarWinds announced further enhancements to SolarWinds Network Performance Monitor (NPM) that offer the robust network performance monitoring, alerting and reporting …

Upcoming Patch Tuesday looks small once again

Microsoft’s March Patch Tuesday is again shaping up to be on the lighter side of some months, continuing the 2014 trend of smaller Patch Tuesdays. We only see 2 issues …

European IT pros reveal top reasons to monitor privileged users

BalaBit IT Security announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring …

HTTPS can’t be trusted to obscure private online activity

HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …

Cybercriminals increasingly drawn to Tor anonymity and hidden services

Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …

A peek into China’s burgeoning mobile cybercriminal underground

Every country’s cybercriminal underground market has distinct characteristics, and with 500 million national mobile Internet users and the number continuously rising, …

New technique targets C code to spot malware attacks

Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on …

Cybersecurity concerns becoming a boardroom issue

The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …

Microsoft’s quest to make users drop Windows XP continues

As the date of the scheduled retirement of Windows XP – arguably one of Microsoft’s most popular products ever – draws near, the company continues its quest …

Major gaps found in the governance of emerging technologies

SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools