Please turn on your JavaScript for this page to function normally.
Data visualization of global DDoS attacks

Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …

A new classification for potentially unwanted mobile apps

What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …

Higher education networks 300% more likely to contain malware

OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …

Building an information security awareness program from scratch

Most security awareness programs suck. They involve canned video presentations or someone from HR explaining computer use policies. Others are extremely expensive and beyond …

Internet of Things starter kit from IBM and Libelium

IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …

Webinar: The threat of unfettered searching

While many have come to appreciate the power of modern search engines, such as Google or Bing, there is a threat presented by unfettered searching – one that can …

Mobile IDS/IPS solution for iOS devices

Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …

Facebook data mining tool uncovers your life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …

Can you trust the apps you use?

With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …

Video: Operationalizing security intelligence in the enterprise

Many organizations say they acquire and use security intelligence for the benefit of their organizations – but few actually do this right. While security intelligence is …

Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests

Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …

Big thinkers converge on small town for Day-Con 2013

Day-Con, Dayton Ohio’s annual hacker conference, celebrated its 7th year last month with a completely re-imagined format: limited seating, invitation only, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools