Opportunities and challenges for CIOs in different industries
CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …
Molerats attacks continue targeting US, EU, Middle East organizations
Not all RAT-wielding attackers come from China, say FireEye researchers. For over a year they have been following the activities of a group of hackers that uses the Poison Ivy …
Cupid exploits Heartbleed bug on WiFi networks and Android
Nearly two months have passed since the public revelation of the Heartbleed bug affecting the widely used open source cryptographic library OpenSSL. The reaction of the …
NSA collects photos to feed facial recognition programs
The NSA has been collecting photos of people’s faces at the tune of 55,000 images every day, and has been feeding the images into its facial recognition programs, James …
International action against Gameover Zeus botnet and CyptoLocker ransomware
On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …
Why endpoint backup is critical
Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …
Open Crypt Audit Project considers taking over development of TrueCrypt
The unexpected notice saying TrueCrypt isn’t safe, which has apparently been posted last week by the developers of the software, took the security community by surprise …
Introducing the Security Culture Summer School
The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …
Fake Android soccer gaming apps just show ads
As the soccer world cup in Brazil is coming close, the offering of soccer-related apps on the Google Play store is big, at least 125 different vuvuzela apps are available. …
IBM eliminates fraudulent behavior in the cloud
IBM has patented a technique that helps online and cloud-based businesses improve their ability to eliminate fraud by analyzing browsing behavior to determine whether …
NIST requests comment on proposed SHA-3 cryptographic standard
The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed SHA-3 Standard, which is designed to protect the integrity of …
WatchGuard integrates wired and wireless network security
WatchGuard has announced that its UTM and NGFW appliances allow users to deploy, configure and manage both wired and wireless network security through a single device in a …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down