Please turn on your JavaScript for this page to function normally.
Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware

Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …

Tips for protecting your personal and business data

As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …

US Senate committee backs law to continue phone-record collection

A few days after a bill seeking to end the government’s dragnet collection of phone records has been introduced by US Senator Patrick Leahy and Congressman Jim …

Security misconceptions among small businesses

More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …

Lavabit and Silent Circle to create email impervious to snooping

The founders of recently shut down encrypted email service Lavabit and encrypted communications firm Silent Circle have announced the creation of the Dark Mail Alliance, a …

Retail sector slow in adopting new PCI standards

Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …

NSA taps cables connecting Google and Yahoo data centers

The US NSA and its UK counterpart GCHQ have collaborated in tapping the overseas fiber-optic cables used by Google and Yahoo to exchange data stored in their many data centers …

Network IDS reduces “white noise” for more focus on critical vulns

RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …

Spike in suspicious traffic and TOR usage, says threat report

Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …

Solving network security complexity with automation

Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …

Exposing unknown threats with mathematical science

Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …

Counterfeit money detector easily hacked to accept fake money

A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools