Latest News

News

Law enforcement and IT security companies join forces to fight ransomware

The Dutch National Police, Europol, Intel Security and Kaspersky Lab have joined forces to launch an initiative which will see the cooperation fight ransomware.

News

Illinois Republican resigns citing cybersecurity issues

A top elected Illinois Republican representative abruptly resigned his position citing "cybersecurity issues" as the reason for his departure.

News

Authorities blocked from accessing accused's iPhone

A man sitting in jail on charges of sex trafficking was ordered by a federal judge to unlock his iPhone, but so far his attorney has succeeded in blocking the order on constitutional grounds.

News

Bugs in SAP HANA allowed remote code execution

Researchers have found several security vulnerabilities in SAP HANA and SAP Trex, which left thousands open to remote code execution attacks

News

WhatsApp in the spotlight after Turkey publishes messages of coup officers

WhatsApp messages of military officers involved in Turkey's attempted coup were published by the country's state-run media outlets.

News

Audit: FBI's threat prioritization process too subjective and sluggish

The FBI's process for prioritizing cyberthreats is too slow and subjective, hindering its ability to optimize allocation of resources to address these dangers, according to a new report from the DoJ's Office of the Inspector General.

News

MS-ISAC official: Ransomware top priority

Ransomware threats targeting government IT systems nationwide at the state and local level are steadily increasing.

News

Microsoft EOP exposes users to data breaches, whitepaper

Vircom researchers believe that Microsoft Exchange Online Protection (EOP) may be exposing users and their networks to both data breach and data loss risks.

News

Auto-ISAC release automotive cybersecurity best practices

The Automotive Information Sharing and Analysis Center (Auto-ISAC) Thursday released a set of automotive cybersecurity "Best Practices."

News

PowerWare ransomware variant poses as Locky, but can be decrypted

The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware.

Data Breach Blog

NC State breach affects 38,000

An attacker gained unauthorized access to a North Carolina State University account containing personally identifiable information.

Featured News

2.3 million 'Warframe,' 'Clash of Kings' accounts compromised

2.3 million 'Warframe,' 'Clash of Kings' accounts compromised

More than 2.3 million users records were compromised as two separate gaming companies announced they suffered data breaches.

Women in IT Security Issue Live Now!

The Threat Hunter Blog

Locky and Dridex - New Wine in Old Bottles

Locky and Dridex - New Wine in Old Bottles

The computer media has been screaming it for the past few days: Locky is back! Dridex is back! Of course they are... these are two of the most prolific - and prosperous - malwares around at the moment.

July 2016 Product Reviews

Citrix XenMobile

First-rate product for mobile application management (MAM), easy on users in a BYOD environment.

IBM MaaS360

This is a real powerhouse, but best for organizations with an IT force experienced in enterprise-level mobile device management.

Opinions

Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US