Privacy and security incident management for healthcare
A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …
EU cybercop: European Cybercrime Centre to focus on criminal gangs
The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …
Learn by doing: Phishing and other online tests
As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …
Microsoft to patch 57 vulnerabilities
The February 2013 Microsoft Patch Tuesday bulletin was released with 12 advisories and is bigger than average, which means security and IT teams will be busier than average. …
Critical flaw lets attackers control hospital, military buildings’ systems
A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …
Despite concerns, smartphone hotspot adoption grows
Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …
EU proposes to make data breach disclosure mandatory
The European Commission has today announced the launch of new proposals that include a requirement for EU member states to appoint an independent CERT and pivotally calls for …
Massive Bamital click-fraud botnet shut down
Symantec and Microsoft have teamed up to take down the Bamital botnet, and are currently in the process of warning users infected with the Trojan on how to remove it from …
Whitehole exploit kit in the spotlight
The effectiveness of exploit kits has made them malware peddlers’ preferred way of distributing their malicious wares. The Blackhole exploit kit is, by far, the most …
F-Secure Client Security updated with threat detection technology
As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …
BYOD is increasing IT frustration and loss of control
IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 …
Aegis Bio: Encrypted USB 3.0 drive with biometric fingerprint access
Apricorn announced the Aegis Bio 3.0, a software-free biometric USB 3.0 drive that safeguards data with secure fingerprint access and military grade 265-bit AES-XTS hardware …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)