Please turn on your JavaScript for this page to function normally.
How Edward Snowden’s actions impacted defense contractors

A new ThreatTrack Security study sheds light on the attitudes of a very exclusive group of IT and security managers – those employed by U.S. defense contractors – …

Insecure file sharing puts corporate data at risk

Personal email could be 2014’s biggest threat to corporate data. A new survey of more than 500 professionals by Globalscape found that in the past 12 months, 63 percent …

GCHQ DoSed Anonymous’ IRC server

British spy agency GCHQ has used Denial of Service attacks against Anonymous, in order to disrupt their communications, their activities, and to lead members of the loosely …

White Lodging confirms POS system breach at 14 US hotels

Hotel management firm White Lodging has confirmed that it has suffered a breach of point of sales systems and has released additional information about the investigation. …

Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics

The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …

Google ups rewards for third-party software patches

Google is constantly tweaking its bug bounty and patch reward program, and the latest change consists of another broadening of scope and reward amount increases. …

Adobe Flash flaw exploited in the wild, update now

Adobe has released an emergency patch for a critical vulnerability affecting Flash Player for Windows, Linux and OS X, the exploitation of which can result in an attacker …

Police ransomware: A multimillion business

The European Cybercrime Centre at Europol published its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the …

Lack of skills hindering appsec programs

An ongoing shortage of skills in application security is severely hampering the implementation of effective Appsec programs, according to SANS. The 2014 Application Security …

DDoS attacks used to influence stock prices

Prolexic Technologies shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values …

Most adults share intimate info via unsecured digital devices

McAfee examined how more than 1,500 consumers are sharing and storing intimate data on their mobile devices, especially with current or former significant others. Sharing …

Windows, IE, Java are most vulnerable

When compared with the numbers from the previous year, 2013 has seen an increase in reported security vulnerabilities and, what’s more, the number of critical …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools