Analysis of U.S. breach data finds reasons for concern
According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made …
Kaspersky Lab predicts core threats for 2013
Kaspersky Lab’s experts outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year …
Privacy protection tips
Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …
FireMon updates Security Manager platform
FireMon announced an update to the Security Manager platform that provides more visibility and insight into the behavior of traffic on the network, and expanded …
Exploit kit authors thrive due to PoC code released by whitehats
Do exploit kit authors actually write the exploits they include in their offerings? Sophos’ researcher Gabor Szappanos says the answer is a resounding “No.” …
Swiss spy agency insider steals terabytes of confidential data
As a good reminder that you should never discount the insider threat, the news that a disgruntled former employee of Nachrichtendienst des Bundes (NDB) – the Swiss …
Spoofed RapidFax alert carries hard-to-detect Trojan
Malicious email alerts purportedly being sent by RapidFax, a service that allows users to send faxes online without the need for a fax machine, have been hitting inboxes in …
How the Eurograbber attack stole 36 million euros
Check Point has revealed how a sophisticated malware attack was used to steal an estimated €36 million from over 30,000 customers of over 30 banks in Italy, Spain, …
Antivirus solutions inadequate in detecting new viruses
Imperva collected and analyzed more than 80 previously non-cataloged viruses against more than 40 antivirus solutions. They found that less than 5% of anti-virus solutions in …
(IN)SECURE Magazine issue 36 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …
80% of attacks are redirects from legitimate sites
Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …
IAM solution for secure email on iOS devices
Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …
Featured news
Resources
Don't miss
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)