Please turn on your JavaScript for this page to function normally.
Exploring the dangers of a mobile lifestyle

We live in an increasingly digital world, and rely on the devices we use to store our more or less valuable information and to perform critical tasks. In fact, according to a …

Insider threat: Users are out of control

Employees are granted excessive privileges and access for their particular roles resulting in unnecessary risks to organizations. One of the most startling statistics from a …

Microsoft releases Sigcheck 2.0

Sigcheck is a command-line utility that shows file version number, timestamp information, and digital signature details, including certificate chains. Version 2.0 adds …

Secure file sharing for Mac with native OS X integration

Infrascale released FileLocker for Mac, with native OS X integration. OS X users now have direct access to File Locker’s Ultrasafe features as well as Private Cloud …

Security now the top issue for network managers

Security returns to the top of the list of network manager ‘pain points.’ Conducted earlier in 2013, TheInfoPro study identifies key initiatives of senior …

Adobe Flash Player sandboxed in Safari on OS X Mavericks

After having worked with Google, Microsoft and Mozilla to incorporate an app sandbox for Flash Player, Adobe has announced that Safari in the recently released OS X Mavericks …

US allies demand explanations about NSA surveillance

Following Le Monde’s Monday report on NSA’s systematic gathering of phone call data of French citizens and the recording of certain calls and text messages has …

GTA 5 cracked PC game scams users

Thousands of impatient gamers have been duped into downloading and running a bogus Grand Theft Auto V version for PCs that made them complete a number of surveys and …

DARPA announces cyber defense tournament with a $2 million cash prize

What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security …

What has changed in ISO 27001?

Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …

Most young adults not interested in a cybersecurity career

While U.S. government officials find the current pipeline for cybersecurity talent to be lacking, 82 percent of U.S. millennials say no high school teacher or guidance …

Cyber attacks targeting the energy sector on the rise

Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools