Cost of fraud and online disruption
Cyber Monday represents an average 55 percent surge in daily online / mobile retail revenues, says a new study by RSA and the Ponemon Institute, and a corresponding surge in …
Visual investigations of botnet command and control behavior
One of the classic debates in computer science concerns whether artificial intelligence or virtual reality is the more worthwhile pursuit. The advocates of artificial …
Five keys to small business cyber safety
According to The Ponemon Institute, 55 percent of small businesses experienced at least one data breach in 2012 and 53 percent had multiple breaches. Yet, a recent study by …
Cloud-based service provides anonymous reporting
LockPath released the Anonymous Incident Portal (AIP), a cloud-based service that lets users securely and anonymously report incidents, complaints, violations and more. The …
Fake Whatsapp notification delivers malware
WhatsApp is one of the most popular instant-messaging services out there, and its huge user base (over 300 million active users) makes Whatsapp-themed spam a great way to …
Google updates reCAPTCHA, makes things easier for users
Google aims to make life easier for its users and more difficult for botmasters with the introduction of the updated reCAPTCHA tool. The announcement was made on Friday by …
UK man indicted for hacking US govt networks, stealing confidential data
The New Jersey U.S. Attorney’s Office has charged an alleged hacker in the United Kingdom with breaching thousands of computer systems in the United States and elsewhere …
Buffer hacked, customer accounts misused to send out spam
Buffer, the popular online service for managing one’s social media presence by scheduling posts on Twitter, Facebook and LinkedIn, has announced on Saturday that they …
Researchers sinkhole several Cryptolocker C&Cs
The cyber crooks behind Cryptolocker, one of the latest ransomware threats, are having much success in infecting PC users with the deadly malware, but whether the victims fork …
Characteristics of effective security leaders
A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …
Traditional security models becoming exhausted
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …
Protect data before sending it to the cloud
IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services