Please turn on your JavaScript for this page to function normally.
door
The IEEE is against mandated encryption backdoors

The Institute of Electrical and Electronics Engineers (IEEE) has added its voice to the chorus of security experts, privacy advocates, lawmakers and other prominent …

Office 365
Whitepaper: Managing users and authentication with on-premises Active Directory for O365

This whitepaper is no longer available. The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and …

eye
How Facebook and Google nudge users to make anti-privacy choices

Facebook, Google and Microsoft use design techniques and tricks to steer users toward sharing more information about themselves to benefit those businesses, the Norwegian …

person
Cybercriminals will gravitate to criminal activity that maximizes their profit

McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

bot
Mobile is the new frontier for malicious bots

Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …

printers tracking dots
Researchers release app that masks printers’ tracking dots

Did you know that nearly all modern color laser printers put tracking patterns of tiny yellow dots on each piece of paper they print? Most printer manufacturers include these …

Twitter yubikey
Twitter adds support for login verification with USB security key

Twitter has some good news for users looking to improve the security of their account: the company has begun rolling out the “login verification with a security …

network
Know what’s happening on your network and make the most of your security tools

In an ideal world, all organizations would know at all times exactly what’s happening on their network: they would have deep enough pockets to buy the equipment and …

chess
Confidence wavers in face of evolving cybersecurity threats

Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

Hand
How criminals abuse IDNs to conduct malicious activities

New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …

vintage computer
IT chiefs keep obsolete systems running just to keep data accessible

89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools