25% of breaches go undetected for more than a day
Recent data breaches have had little impact on the security controls of retail and financial organizations, according to Tripwire. Of the 102 financial organizations and 151 …
It’s World Password Day: Change your passwords
Today (May 7) is World Password Day – a day dedicated to promoting the use of strong passwords and the creation of good habits when it comes to choosing passwords. …
2014 starts with record-breaking malware traffic
AppRiver released a detailed analysis of web and email-borne threats and malware trends traced between January and March 2014. During the first quarter of 2014, AppRiver …
Wi-Fi Smart Plug: Control devices from anywhere
D-Link announced the Wi-Fi Smart Plug (DSP-W215), which allows users to monitor and control their home’s electronic devices from anywhere. Using the free mydlink app for …
Dropbox fixes link-sharing data-leaking flaw
Popular file hosting service Dropbox has announced that it has patched a vulnerability that would make privately shared links accessible to those for whom they weren’t …
Password management done right
David Sancho, senior threat researcher with Trend Micro, has recently written a short but good post in which he pointed out the reasons why despite their inherent insecurity, …
Reset the Net action aims to thwart online mass surveillance
A group of over 30 Internet companies and civil liberties, environmental and political organizations have announced a global call to action aimed at making mass Internet …
“Facebook deactivation” scam doing rounds
A curious like-harvesting scam is doing rounds on Facebook, threatening users with account deactivation if they don’t go through the steps defined in scammy status …
Windows flaw allows access to data after accounts are revoked
A disabled account in Windows’ network does not take effect immediately, according to Aorato. In fact, due to design considerations disabled accounts – and the …
Embedding positive security behaviors is essential
Organizations have spent millions over recent decades on information security awareness activities. The rationale behind this approach was to take their biggest asset – …
Cybergangs accelerating velocity of targeted brand development
Cybercrime gangs are accelerating their substitution of targeted brands at an alarming new pace, according to a new APWG report. Of the 681 targets that were phished in 2H …
Tips for utilities to comply with new cybersecurity standards
When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains