ENISA provides new guide for mitigating ICS attacks
The EU’s cyber security agency ENISA has provided a new manual for better mitigating attacks on Industrial Control Systems (ICS), supporting vital industrial processes …
Over 80% of employees use unauthorized apps at work
More than 80 percent of employees admit to using non-approved SaaS applications in their jobs, say the results of a McAfee survey. But what’s even more interesting is …
Fake Amazon “Order Status” emails deliver malware
It comes as no surprise that as holiday shoppers begin to flood the internet looking for deals, the bad guys will be right behind them hoping to swoop in on an unsuspecting …
9 out of 10 consumers would rather companies didn’t store their info
In the wake of data scandals, consumer trust in data security has hit a ten year low, with over 1 in 10 suffering from a data loss, Fujitsu’s data research report has …
Passwords aren’t going away any time soon
Despite nearly weekly revelations of new password database breaches, a survey by Authentify suggests that passwords will remain the primary protection for online accounts. Of …
Researchers prove malware can communicate via computer speakers and microphones
Physically isolating critical systems from networks and systems that are unsecured has long been used as a simple way to protect the former from unwanted intrusions and …
Rogue apps can remove Android device locks
Security researchers from German IT consultancy Curesec have uncovered the existence of an Android flaw that could allow hackers to remove all existing device locks activated …
Wisconsin man sentenced for DDoS attack against Koch Industries
A Wisconsin man has been sentenced to two years federal probation and ordered to pay restitution for taking part in a 2011 DDoS attack mounted against the official website of …
Experts offer cyber security forecast for the year ahead
Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …
Huge quantity of Bitcoins stolen from Sheep Marketplace
Another week, another huge Bitcoin theft. This time, it’s the customers of Tor-based underground market Sheep Marketplace who have been left with empty wallets. If the …
(IN)SECURE Magazine issue 40 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 40 has been released today. Table of contents: How …
Security gate for open doors
Internet crime has evolved to a full blown cyber-war, using internet servers as virtual soldiers to take down critical network infrastructures, or to steal information. While …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground