CIOs are moving more information into the cloud
Despite continued concerns about security, CIOs and other senior-level IT leaders are moving an increasing percentage of their organizational information into the cloud and …
Tips for improving your cyber security
With cyber threats around the globe evolving and becoming more sophisticated, evidenced by the recent data breach at retailer Target, it is important that consumers protect …
European Cybercrime Centre warns about Windows XP security risks
The European Cybercrime Centre (EC3) at Europol warns about security risks related to the end of Windows XP support. After 8 April 2014, Windows will stop supporting its …
Cost of Advanced Evasion Techniques in recent data breaches
A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats …
Simple steps to prevent data theft
HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …
Week in review: Banks sue Target and Trustwave, Basecamp DDoS, Fyodor restarts the Full Disclosure list
Here’s an overview of some of last week’s most interesting news, reviews and articles: Flaws in Android update mechanism could turn apps into malware A group of …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
WordPress sites hijacked via “free” premium plugins
If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …
Uncommon new worm targets Word and Excel files
Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …
Having a backup solution doesn’t prevent data loss
Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …
Challenges of running cloud-hosted applications
CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …
Analysis of three billion attacks reveals SQL injections cost $196,000
NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous