Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
(ISC)2 Foundation offers $145,000 in information security scholarships
The (ISC)2 Foundation, the non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life with community cyber …
One in five SMB retailers lacks security fundamentals
Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …
Privacy takes center stage
AnchorFree anticipates digital privacy, security and access concerns will escalate in 2014 as the following consumer trends take shape. Shift to private and erasable social …
Privacy advocates announce day of protest against NSA spying
A broad coalition of activist groups, companies, and online platforms will hold a worldwide day of activism in opposition to the NSA’s mass spying regime on February …
Bitcoin cold storage and insurance services sprout
The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …
Fake Target breach notification leads to phishing and complex scams
The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …
Neiman Marcus, three other US retailers breached
In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground