Latest News

News

'Crackas with Attitude' suspect arrested in U.K.

The teen suspected of leaking the information of several U.S. government officials was arrested in the U.K.

News

NYPD docs show stingrays used 1,016 times without warrant

The NYCLU has released documents obtained from the NYPD detailing widespread stingray use without a written policy or warrants.

News

Does the UK need a chief information security officer?

While most of the media understandably covers the search for a new President of the United States, we couldn't help but notice another job going begging at the White House: CISO. Which got us to thinking...

News

Discount third-party Netflix services are a 'House of Cards,' warns cybersecurity blog

Researchers have been observing a litany of attacks against Netflix, its customers, and consumers interested in the content streaming service, warned Symantec in a blog post yesterday.

News

Android malware masquerades as AliPay app

An Android malware is masquerading as a security feature for AliPay, a Chinese PayPal-like online payment app.

Data Breach Blog

Unauthorized access leads to Neiman Marcus Group breach, 5,200 affected

Neiman Marcus Group (NMG) reported that someone gained unauthorized access to thousands of online customer accounts.

Missing drives contained PHI on 950K Centene customers

During an inventory of its IT assets, health insurer Centene discovered that six hard drives containing personal and health information on 950,000 customers had gone missing.

University of Virginia hit with Phishing scam, 1,400 affected

The University of Virginia (UVA) suffered a data breach that was initiated via a phishing scam that revealed the tax and banking data of some of the school's employees.

Featured News

IBM: Phishing scams a major cause of bank breaches

IBM: Phishing scams a major cause of bank breaches

Malicious attachments and links, ShellShock and Denial of Service (DOS) attacks were the top three cyber threats facing the financial sector, which suffered having 20 million records breached last year, according to a new study released by IBM.

The Threat Hunter Blog

Fast Flux Bot Nets and Fluxer - Part 1

Fast Flux Bot Nets and Fluxer - Part 1

This time we'll start a two-parter on fast flux bot nets including the concept of domain generation algorithms.

February issue now available

Opinions

Opinions Me and my job: Gina Chapman

Me and my job: Gina Chapman

Gina Chapman, senior director of security operations, Center for Internet Security

Opinions

Threat of the month: February 2016

Threat of the month: Man-in-the-middle attack

Opinions

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US