A look at security effectiveness by industry
BitSight analyzed security ratings for over 70 Fortune 200 companies in four industries – energy, finance, retail and technology. The objective was to uncover …
Google encourages teens to contribute to open source projects
For the fourth year in a row, Google has organized its Code-in contest for pre-university students to contribute to open source projects. “For many students the Google …
Data sharing and interoperability are key for mitigating cyber attacks
The EU Agency ENISA launches its new report – Detect, SHARE, Protection on how to make data threat exchange easier and better between the “digital fire …
Secure Dropbox data using a hardware security token
Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they …
Bogus “free Bitcoin generator” offer leads to malware
The rising popularity of Bitcoin hasn’t gone unnoticed by online scammers, and according to ThreatTrack’s Chris Boyd, they have started tricking users into …
Best practices for businesses to secure their IT infrastructure
“Tis the season for reflecting on another year’s success, kicking off 2014 planning and preparing for… security attacks? With Cyber Monday and the holidays …
Ruling that authorized NSA bulk email data collection is disclosed
A new batch of declassified documents released by the Obama administration include one ruling made by the then chief judge of the Foreign Intelligence Surveillance Court, with …
E-sports to pay $1M to settle covert Bitcoin mining complaint
The New Jersey attorney general’s office announced today that on-line video gaming company E-Sports Entertainment, LLC, has entered into a $1 million settlement that …
GitHub accounts hacked in ongoing brute force attack
GitHub users should consider changing their account password to a more complex one and setting up 2-factor authentication in order to protect themselves from automated brute …
Uncontrolled privileged access still a major issue
The NSA’s notorious insider breach has caused 52 percent of IT security professionals to reconsider their approach to user and systems administrator privileges, yet the …
IT pros unsure of security risks when using remote support tools
Research from Bomgar and Ovum surveyed 300 IT decision-makers across the UK, France and Germany, focusing on the challenges faced by enterprise companies that provide remote …
90% of workers in Britain cannot resist clicking on a web link
90% of UK workers surveyed have clicked on a web link embedded in an email with two-thirds (66%) admitting they very rarely first check to ensure the link is genuine, …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous