Lack of network history delays resolution of security issues
Endace released the findings from its survey that highlight the operational challenges being faced by IT teams as they come to terms with the latest high-speed, …
Tips for staying safe this Cyber Monday
Cyber Monday, one of the largest online shopping days of the entire year, is coming November 26. The National Retail Federation estimates that shoppers spent more than $1.2 …
Curiosity-piquing Twitter DM leads to double threat
A double threat has been aimed at Twitter users as Direct Messages carrying a Facebook link and the question “what on earth could you be doing in our movie?” are …
Mobile spam is impacting most U.S. adults
Mobile spam has become prevalent, with the majority of U.S. adults who text reporting that they have received an unsolicited text message, according to a survey conducted …
90% say online privacy is threatened
Ninety percent of U.S. consumers who use a mobile device for work activities feel their online privacy is threatened, but many persist in putting their privacy and security at …
Check Point unveils ThreatCloud Security Services
Check Point has announced ThreatCloud Security Services, a set of new security service offerings to assist customers in protecting their organisation’s networks from …
NETGEAR unveils new VDSL application firewall
NETGEAR introduced the ProSecure UTM25S Unified Threat Management Firewall, which provides two modular slots that fit optional interface cards, enabling IT administrators to …
Skype fixes account hijacking vulnerability
Skype has temporarily disabled its password reset function while it was investigating reports about a vulnerability that has been misused to hijack users’ accounts, but …
Should Windows 8 users be worried about ransomware?
Does ransomware designed for Windows 7 and older versions of the OS work on the newly released Windows 8? Symantec researchers took it upon themselves to answer that question …
The global expansion of cybercrime
McAfee released a new report which explores techniques in cybercrime as well as the global evolution of cyber exploits. It uncovers new details of “Operation High …
Testing proves advice on keeping computers safe is sound
Amid the often repeated advice about how to keep your computer and yourself safe from malware and criminals spreading it there are some real gold nuggets, as the German …
Hacker claims to have breached Adobe, releases customer data
An Egyptian hacker claims to have breached one of Adobe’s servers and gotten his hands on a database containing over 150,000 records belonging to Adobe’s …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware